INFO: task kworker/0:1:11 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:11 tgid:11 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df845d84 r8:00000002 r7:60000113 r6:df845d8c r5:83238000 r4:83238000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83238000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df845e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85921400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83238000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd1b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858cdf8c r4:858cdc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858cdf8c r4:830b8600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83238000 r8:830b862c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8600 r8:80287e08 r7:df83de60 r6:830b8700 r5:83238000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf845fb0 to 0xdf845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:830b5a00 INFO: task kworker/0:1:11 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 INFO: task kworker/0:0:3098 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:3098 tgid:3098 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df999d84 r8:00000002 r7:60000113 r6:df999d8c r5:83883000 r4:83883000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83883000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df999e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8590a5c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83883000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba5f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c6b8c r4:858c6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c6b8c r4:83ffc500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83883000 r8:83ffc52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83ffc500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ffc500 r8:80287e08 r7:ec5a1e60 r6:83ffc600 r5:83883000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf999fb0 to 0xdf999ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83368540 INFO: task kworker/0:0:3098 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 INFO: task kworker/0:4:3119 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3119 tgid:3119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df981d84 r8:00000002 r7:60000013 r6:df981d8c r5:8387bc00 r4:8387bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8387bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df981e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8590a6c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8387bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba7f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c6f8c r4:858c6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c6f8c r4:84787a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8387bc00 r8:84787aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84787a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787a80 r8:80287e08 r7:df961e60 r6:84787e80 r5:8387bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf981fb0 to 0xdf981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847a4840 INFO: task kworker/0:4:3119 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 INFO: task kworker/0:5:3121 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3121 tgid:3121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df979d84 r8:00000002 r7:60000113 r6:df979d8c r5:8387ec00 r4:8387ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8387ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df979e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8590a940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8387ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb91000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c778c r4:858c7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c778c r4:84787f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8387ec00 r8:84787f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84787f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787f00 r8:80287e08 r7:df981e60 r6:84787380 r5:8387ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf979fb0 to 0xdf979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847a4840 INFO: task kworker/0:5:3121 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 INFO: task kworker/1:6:3130 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9f1d84 r8:00000002 r7:60000113 r6:df9f1d8c r5:8430b000 r4:8430b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8430b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 INFO: task kworker/1:6:3130 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 INFO: task kworker/1:7:3132 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3132 tgid:3132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa01d84 r8:00000002 r7:60000113 r6:dfa01d8c r5:84309800 r4:84309800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84309800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa01e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85096cc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84309800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e064d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509e38c r4:8509e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509e38c r4:847e6b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84309800 r8:847e6bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b80 r8:80287e08 r7:df9f1e60 r6:847e6c00 r5:84309800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa01fb0 to 0xdfa01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0500 INFO: task kworker/1:7:3132 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 INFO: task kworker/1:8:3135 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3135 tgid:3135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9add84 r8:00000002 r7:60000113 r6:df9add8c r5:83243c00 r4:83243c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83243c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9ade08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850eda00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83243c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9af000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509f38c r4:8509f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509f38c r4:847e6c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83243c00 r8:847e6cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6c80 r8:80287e08 r7:dfa01e60 r6:847e6d00 r5:83243c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9adfb0 to 0xdf9adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847ef440 INFO: task kworker/1:8:3135 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 INFO: task kworker/1:9:3137 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa19d84 r8:00000002 r7:60000113 r6:dfa19d8c r5:83244800 r4:83244800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83244800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa19e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85157940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83244800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb99000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8471878c r4:84718400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8471878c r4:847e6d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83244800 r8:847e6dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6d80 r8:80287e08 r7:df9ade60 r6:847e6e00 r5:83244800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa19fb0 to 0xdfa19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8479ae40 INFO: task kworker/1:9:3137 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 INFO: task kworker/1:10:3138 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3138 tgid:3138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9fdd84 r8:00000002 r7:60000013 r6:df9fdd8c r5:83236000 r4:83236000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83236000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9fde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85175d80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83236000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab63000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85205f8c r4:85205c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85205f8c r4:847e6e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83236000 r8:847e6eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6e80 r8:80287e08 r7:dfa19e60 r6:847e6f00 r5:83236000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9fdfb0 to 0xdf9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d75200 INFO: task kworker/1:10:3138 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 INFO: task kworker/1:11:3140 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa35d84 r8:00000002 r7:60000113 r6:dfa35d8c r5:833a8c00 r4:833a8c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:833a8c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa35e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d9700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:833a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9c3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8471af8c r4:8471ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8471af8c r4:847e6f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:833a8c00 r8:847e6fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6f80 r8:80287e08 r7:df9fde60 r6:847e6900 r5:833a8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa35fb0 to 0xdfa35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842b9040 INFO: task kworker/1:11:3140 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3142 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa41d84 r8:00000002 r7:60000113 r6:dfa41d8c r5:84116c00 r4:84116c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84116c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa41e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85318c80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84116c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc79000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851aab8c r4:851aa800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851aab8c r4:847e6880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84116c00 r8:847e68ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6880 r8:80287e08 r7:dfa35e60 r6:847e6800 r5:84116c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa41fb0 to 0xdfa41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842b9040 INFO: task kworker/1:12:3142 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3144 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa4dd84 r8:00000002 r7:60000113 r6:dfa4dd8c r5:84110c00 r4:84110c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84110c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa4de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85314940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84110c00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9c9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a978c r4:851a9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a978c r4:847e6780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84110c00 r8:847e67ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6780 r8:80287e08 r7:dfa41e60 r6:847e6500 r5:84110c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa4dfb0 to 0xdfa4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842b9300 INFO: task kworker/1:13:3144 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3146 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa59d84 r8:00000002 r7:60000113 r6:dfa59d8c r5:84114800 r4:84114800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84114800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa59e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85376a80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84114800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe97000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851ab78c r4:851ab400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851ab78c r4:847e6580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84114800 r8:847e65ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6580 r8:80287e08 r7:dfa41e60 r6:847e6600 r5:84114800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa59fb0 to 0xdfa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842b9400 INFO: task kworker/1:14:3146 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3148 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa65d84 r8:00000002 r7:60000113 r6:dfa65d8c r5:84110000 r4:84110000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84110000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854144c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84110000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06b3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8405878c r4:84058400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8405878c r4:847e6680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84110000 r8:847e66ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6680 r8:80287e08 r7:dfa59e60 r6:847e6700 r5:84110000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa65fb0 to 0xdfa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842b9500 INFO: task kworker/1:15:3148 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3150 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa71d84 r8:00000002 r7:60000113 r6:dfa71d8c r5:83395400 r4:83395400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83395400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa71e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853efdc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83395400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48a9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8405838c r4:84058000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8405838c r4:847e6480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83395400 r8:847e64ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6480 r8:80287e08 r7:dfa65e60 r6:847e6400 r5:83395400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa71fb0 to 0xdfa71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842b9780 INFO: task kworker/1:16:3150 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3152 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa7dd84 r8:00000002 r7:60000113 r6:dfa7dd8c r5:83393000 r4:83393000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83393000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa7de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555f6c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83393000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab0d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c0b8c r4:855c0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855c0b8c r4:847e6300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83393000 r8:847e632c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6300 r8:80287e08 r7:dfa65e60 r6:847e6200 r5:83393000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa7dfb0 to 0xdfa7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842b98c0 INFO: task kworker/1:17:3152 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3154 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3154 tgid:3154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa89d84 r8:00000002 r7:60000113 r6:dfa89d8c r5:842fa400 r4:842fa400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:842fa400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa89e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f9380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:842fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8971000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8471bb8c r4:8471b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8471bb8c r4:847e6280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:842fa400 r8:847e62ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6280 r8:80287e08 r7:dfa7de60 r6:847e6180 r5:842fa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa89fb0 to 0xdfa89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842b9ac0 INFO: task kworker/1:18:3154 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3156 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa95d84 r8:00000002 r7:60000113 r6:dfa95d8c r5:842f9800 r4:842f9800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:842f9800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa95e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550f7c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:842f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0181000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854acb8c r4:854ac800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854acb8c r4:847e6100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:842f9800 r8:847e612c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6100 r8:80287e08 r7:dfa7de60 r6:847e6000 r5:842f9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa95fb0 to 0xdfa95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842b9b40 INFO: task kworker/1:19:3156 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3157 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3157 tgid:3157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaa1d84 r8:00000002 r7:60000113 r6:dfaa1d8c r5:842fe000 r4:842fe000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:842fe000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85531f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:842fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4893000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8405938c r4:84059000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8405938c r4:847e6080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:842fe000 r8:847e60ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6080 r8:80287e08 r7:dfa7de60 r6:83353500 r5:842fe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa1fb0 to 0xdfaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842b9e40 INFO: task kworker/1:20:3157 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3160 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfab9d84 r8:00000002 r7:60000113 r6:dfab9d8c r5:842fc800 r4:842fc800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:842fc800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca2bc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:842fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafcf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c1f8c r4:855c1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855c1f8c r4:83353580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:842fc800 r8:833535ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83353580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83353580 r8:80287e08 r7:dfa7de60 r6:8336df00 r5:842fc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab9fb0 to 0xdfab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842b9f40 INFO: task kworker/1:21:3160 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3162 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfac5d84 r8:00000002 r7:60000113 r6:dfac5d8c r5:842fec00 r4:842fec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:842fec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e3c400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:842fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa67000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c3b8c r4:855c3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855c3b8c r4:832a0000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:842fec00 r8:832a002c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:832a0000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a0000 r8:80287e08 r7:dfab9e60 r6:847e5000 r5:842fec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac5fb0 to 0xdfac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8477be40 INFO: task kworker/1:22:3162 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3164 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfad1d84 r8:00000002 r7:60000113 r6:dfad1d8c r5:84183c00 r4:84183c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84183c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cab780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84183c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa83000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855ee38c r4:855ee000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855ee38c r4:847e5080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84183c00 r8:847e50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5080 r8:80287e08 r7:dfac5e60 r6:847e5100 r5:84183c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad1fb0 to 0xdfad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8442d280 INFO: task kworker/1:23:3164 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:3166 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3166 tgid:3166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaddd84 r8:00000002 r7:60000113 r6:dfaddd8c r5:8330ec00 r4:8330ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8330ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfadde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85780a80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8330ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafc1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ceb8c r4:856ce800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856ceb8c r4:847e5180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8330ec00 r8:847e51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5180 r8:80287e08 r7:dfad1e60 r6:847e5200 r5:8330ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaddfb0 to 0xdfaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8442d400 INFO: task kworker/1:24:3166 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3167 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfae1d84 r8:00000002 r7:60000013 r6:dfae1d8c r5:8430a400 r4:8430a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8430a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f04400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430a400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855eeb8c r4:855ee800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855eeb8c r4:847e5280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430a400 r8:847e52ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5280 r8:80287e08 r7:dfadde60 r6:830cc300 r5:8430a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae1fb0 to 0xdfae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8442d400 INFO: task kworker/1:25:3167 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3170 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfafdd84 r8:00000002 r7:60000113 r6:dfafdd8c r5:8430c800 r4:8430c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8430c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfafde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8578ab40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430c800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8571ab8c r4:8571a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8571ab8c r4:847e5300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430c800 r8:847e532c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5300 r8:80287e08 r7:dfadde60 r6:830cc280 r5:8430c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfafdfb0 to 0xdfafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8442d640 INFO: task kworker/1:26:3170 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3173 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3173 tgid:3173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb19d84 r8:00000002 r7:60000013 r6:dfb19d8c r5:8430ec00 r4:8430ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8430ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb19e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c97c40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae51000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8571af8c r4:8571ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8571af8c r4:847e5380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430ec00 r8:847e53ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5380 r8:80287e08 r7:dfafde60 r6:830cc400 r5:8430ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb19fb0 to 0xdfb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8442d800 INFO: task kworker/1:27:3173 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:3174 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb1dd84 r8:00000002 r7:60000113 r6:dfb1dd8c r5:8386e000 r4:8386e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8386e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb1de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85061980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8386e000 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8405b78c r4:8405b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8405b78c r4:847e5400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8386e000 r8:847e542c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5400 r8:80287e08 r7:dfb19e60 r6:830cc380 r5:8386e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb1dfb0 to 0xdfb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8442d800 INFO: task kworker/1:28:3174 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:29:3176 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:29 state:D stack:0 pid:3176 tgid:3176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb2dd84 r8:00000002 r7:60000113 r6:dfb2dd8c r5:8386b000 r4:8386b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8386b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb2de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85877680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8386b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec82d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a338c r4:858a3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a338c r4:847e5480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8386b000 r8:847e54ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5480 r8:80287e08 r7:dfb1de60 r6:8427bb80 r5:8386b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb2dfb0 to 0xdfb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8442db40 INFO: task kworker/1:29:3176 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:30:3177 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:30 state:D stack:0 pid:3177 tgid:3177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb31d84 r8:00000002 r7:60000113 r6:dfb31d8c r5:8386d400 r4:8386d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8386d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb31e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85866ac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8386d400 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0635000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582578c r4:85825400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8582578c r4:847e5500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8386d400 r8:847e552c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5500 r8:80287e08 r7:dfb2de60 r6:8427bb00 r5:8386d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb31fb0 to 0xdfb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8442da40 INFO: task kworker/1:30:3177 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3180 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3180 tgid:3180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb4dd84 r8:00000002 r7:60000113 r6:dfb4dd8c r5:8386a400 r4:8386a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8386a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85111400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8386a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa0f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85934f8c r4:85934c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85934f8c r4:847e5600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8386a400 r8:847e562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5600 r8:80287e08 r7:dfb2de60 r6:844f1e00 r5:8386a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8442dc40 INFO: task kworker/1:31:3180 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:32:3181 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:32 state:D stack:0 pid:3181 tgid:3181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb59d84 r8:00000002 r7:60000113 r6:dfb59d8c r5:84308000 r4:84308000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84308000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb59e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592d5c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84308000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb98f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8405bb8c r4:8405b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8405bb8c r4:847e5680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84308000 r8:847e56ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5680 r8:80287e08 r7:dfb4de60 r6:844f1c80 r5:84308000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb59fb0 to 0xdfb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8442df00 INFO: task kworker/1:32:3181 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:33:3183 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:33 state:D stack:0 pid:3183 tgid:3183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb61d84 r8:00000002 r7:60000113 r6:dfb61d8c r5:83bc0c00 r4:83bc0c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83bc0c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb61e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592d6c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83bc0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8472078c r4:84720400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8472078c r4:847e5780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83bc0c00 r8:847e57ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5780 r8:80287e08 r7:dfb4de60 r6:844f1d80 r5:83bc0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb61fb0 to 0xdfb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8442dc40 INFO: task kworker/1:33:3183 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:3186 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:3186 tgid:3186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb7dd84 r8:00000002 r7:60000013 r6:dfb7dd8c r5:83bc2400 r4:83bc2400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83bc2400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb7de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fa9c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83bc2400 r7:00000000 r6:83018200 r5:00001000 r4:7f1f5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb6f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593778c r4:85937400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593778c r4:847e5800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83bc2400 r8:847e582c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5800 r8:80287e08 r7:dfb4de60 r6:844f1c00 r5:83bc2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:844801c0 INFO: task kworker/1:34:3186 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:3188 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:3188 tgid:3188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaadd84 r8:00000002 r7:60000113 r6:dfaadd8c r5:83308c00 r4:83308c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83308c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaade08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d46c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83308c00 r7:00000000 r6:83018200 r5:00001000 r4:7f14b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593578c r4:85935400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593578c r4:847e5880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83308c00 r8:847e58ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5880 r8:80287e08 r7:dfb7de60 r6:847e5900 r5:83308c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaadfb0 to 0xdfaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84480240 INFO: task kworker/1:35:3188 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:36:3189 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:36 state:D stack:0 pid:3189 tgid:3189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaedd84 r8:00000002 r7:60000113 r6:dfaedd8c r5:8330d400 r4:8330d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8330d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fab00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8330d400 r7:00000000 r6:83018200 r5:00001000 r4:7f1f7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbe1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85937b8c r4:85937800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85937b8c r4:847e5980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8330d400 r8:847e59ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5980 r8:80287e08 r7:dfb7de60 r6:847e5a00 r5:8330d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84480240 INFO: task kworker/1:36:3189 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:37:3192 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:37 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb89d84 r8:00000002 r7:60000113 r6:dfb89d8c r5:844c8000 r4:844c8000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844c8000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb89e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fa900 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f1f3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb67000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593738c r4:85937000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593738c r4:847e5a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844c8000 r8:847e5aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5a80 r8:80287e08 r7:dfb7de60 r6:847e5b00 r5:844c8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb89fb0 to 0xdfb89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84480580 INFO: task kworker/1:37:3192 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:38:3194 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:38 state:D stack:0 pid:3194 tgid:3194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfba1d84 r8:00000002 r7:60000013 r6:dfba1d8c r5:844c8c00 r4:844c8c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844c8c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fa7c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f1f1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaf5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85936f8c r4:85936c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85936f8c r4:847e5b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844c8c00 r8:847e5bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5b80 r8:80287e08 r7:dfb89e60 r6:847e5c00 r5:844c8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba1fb0 to 0xdfba1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84480580 INFO: task kworker/1:38:3194 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:39:3196 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:39 state:D stack:0 pid:3196 tgid:3196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbb5d84 r8:00000002 r7:60000113 r6:dfbb5d8c r5:844ca400 r4:844ca400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844ca400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fa700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f1ef000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb891000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85936b8c r4:85936800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85936b8c r4:847e5c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844ca400 r8:847e5cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5c80 r8:80287e08 r7:dfba1e60 r6:847e5d00 r5:844ca400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb5fb0 to 0xdfbb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:844808c0 INFO: task kworker/1:39:3196 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:40:3198 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:40 state:D stack:0 pid:3198 tgid:3198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbc1d84 r8:00000002 r7:60000013 r6:dfbc1d8c r5:844cbc00 r4:844cbc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844cbc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853748c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f1e9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba57000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85a0fb8c r4:85a0f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85a0fb8c r4:847e5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844cbc00 r8:847e5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5d80 r8:80287e08 r7:dfbb5e60 r6:847e5e00 r5:844cbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc1fb0 to 0xdfbc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84480b40 INFO: task kworker/1:40:3198 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:41:3199 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:41 state:D stack:0 pid:3199 tgid:3199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbcdd84 r8:00000002 r7:60000113 r6:dfbcdd8c r5:83bc3c00 r4:83bc3c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83bc3c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbcde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fa600 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83bc3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f1ed000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8593678c r4:85936400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593678c r4:847e5e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83bc3c00 r8:847e5eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5e80 r10:00000000 r9:847e5e80 r8:80287e08 r7:dfbc1e60 r6:83364c00 r5:83bc3c00 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:842f8c00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8593638c r4:85936000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:847e5f00 r8:80287e08 r7:dfbc1e60 r6:83364b80 r5:842f8c00 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:8506c000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e1900 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e40c00 r7:00000000 r6:83018200 r5:00001000 r4:7f1f5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb497000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859aa78c r4:859aa400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859aa78c r4:847e5f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e40c00 r8:847e5fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e5f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e5f80 r8:80287e08 r7:dfbc1e60 r6:830b8480 r5:84e40c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf5fb0 to 0xdfbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847a4700 INFO: task kworker/1:43:3205 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:844c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f2b3000 r5:859aaf8c r4:859aac00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r5:00001000 r4:dfc25000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:6:3208 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbd1d84 r8:00000002 r7:60000113 r6:dfbd1d8c r5:844cc800 r4:844cc800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844cc800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8590a880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb79000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c738c r4:858c7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c738c r4:830b8400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844cc800 r8:830b842c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:80287e08 r7:df979e60 r6:84ccc080 r5:844cc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd1fb0 to 0xdfbd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cce4c0 INFO: task kworker/0:6:3208 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xe060dd28 to 0xe060dd70) r4:e060ddc0 r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) INFO: task kworker/1:45:3211 blocked for more than 451 seconds. r5:844cd400 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:859aab8c r4:859aa800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84ccc100 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf1fb0 to 0xdfbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d84100 INFO: task kworker/1:45:3211 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:844cec00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 r5:85b5578c r4:85b55400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84ccc200 r8:80287e08 r7:dfbf1e60 r6:84ccc280 r5:844cec00 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:854e138c r4:854e1000 r10:61c88647 r9:844cb000 r8:84ccc32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe060dd28 to 0xe060dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:dfc3dd84 r8:00000002 r7:60000113 r6:dfc3dd8c r5:844d8000 r4:844d8000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844d8000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc3de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8590aa80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844d8000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbb1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c7b8c r4:858c7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c7b8c r4:84e4b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d8000 r8:84e4b02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e4b000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e4b000 r8:80287e08 r7:df979e60 r6:84ccc480 r5:844d8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc3dfb0 to 0xdfc3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cce780 INFO: task kworker/0:7:3217 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:48:3219 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:48 state:D stack:0 pid:3219 tgid:3219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:844d9800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc49e08 r5:00001000 r4:ec89d000 r5:85b3578c r4:85b35400 r7:ddde2d80 r6:83018200 r5:85b3578c r4:84ccc500 r10:00000000 r9:84ccc500 r8:80287e08 r7:dfc15e60 r6:84ccc580 r5:844d9800 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) INFO: task kworker/0:8:3221 blocked for more than 451 seconds. r4:844db000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc59e08 r5:00001000 r4:ec8d7000 r5:858cf78c r4:858cf400 r7:dddced80 r6:83018000 r5:858cf78c r4:84e4b080 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3222 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3222 tgid:3222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc5dd84 r8:00000002 r7:60000113 r6:dfc5dd8c r5:844d8c00 r4:844d8c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844d8c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc5de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8590ab40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbe1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c7f8c r4:858c7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c7f8c r4:84e4b100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844d8c00 r8:84e4b12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e4b100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e4b100 r8:80287e08 r7:dfc59e60 r6:84ccc680 r5:844d8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc5dfb0 to 0xdfc5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cce940 INFO: task kworker/0:9:3222 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:858cc38c r4:858cc000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdfc6dfb0 to 0xdfc6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ccea40 INFO: task kworker/0:10:3223 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c085000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3226 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3226 tgid:3226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc7dd84 r8:00000002 r7:60000113 r6:dfc7dd8c r5:844dd400 r4:844dd400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844dd400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc7de08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:858ccb8c r4:858cc800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84e4b200 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebc65000 r5:858ccf8c r4:858ccc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:844de000 r8:84e4b2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e4b280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e4b280 r8:80287e08 r7:dfc59e60 r6:84ccc800 r5:844de000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc8dfb0 to 0xdfc8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cced40 INFO: task kworker/0:12:3228 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc09e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:858cd38c r4:858cd000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84e4b300 9fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85b49b8c r4:85b49800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 r5:84fdf38c r4:84fdf000 r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:50:3234 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:50 state:D stack:0 pid:3234 tgid:3234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcadd84 r8:00000002 r7:60000113 r6:dfcadd8c r5:844dbc00 r4:844dbc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844dbc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcade08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85391fc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f327000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece87000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b5478c r4:85b54400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5478c r4:84ccc900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844dbc00 r8:84ccc92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ccc900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ccc900 r8:80287e08 r7:dfc15e60 r6:84ccc980 r5:844dbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcadfb0 to 0xdfcadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d84d00 INFO: task kworker/1:50:3234 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 r5:84fdf38c r4:84fdf000 r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85b57b8c r4:84ccca00 r10:00000000 r9:84ccca00 r8:80287e08 r7:dfc15e60 r6:84ccca80 r5:844dec00 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:84fdf38c r4:84fdf000 r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3239 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3239 tgid:3239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfccdd84 r8:00000002 r7:60000013 r6:dfccdd8c r5:844da400 r4:844da400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844da400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfccde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85921140 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844da400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebca1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858cd78c r4:858cd400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858cd78c r4:84e4b480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844da400 r8:84e4b4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e4b480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e4b480 r8:80287e08 r7:dfc59e60 r6:84cccb00 r5:844da400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfccdfb0 to 0xdfccdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847f9080 INFO: task kworker/0:14:3239 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:8506c000 task:kworker/1:52 state:D stack:0 pid:3240 tgid:3240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcc1d84 r8:00000002 r7:60000113 r6:dfcc1d8c r5:844ce000 r4:844ce000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844ce000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcc1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8540bd80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f4ab000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed607000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85b5778c r4:85b57400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85b5778c r4:84cccb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844ce000 r8:84cccbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cccb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cccb80 r8:80287e08 r7:dfc89e60 r6:84cccc00 r5:844ce000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcc1fb0 to 0xdfcc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d83200 INFO: task kworker/1:52:3240 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 r4:00000000 r5:84fdf38c r4:84fdf000 r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) INFO: task kworker/1:53:3243 blocked for more than 451 seconds. r5:84180c00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85c6038c r4:85c60000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c6038c r4:84cccc80 r10:00000000 r9:84cccc80 r8:80287e08 r7:dfc89e60 r6:84cccd00 r5:84180c00 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:54:3245 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:84e18000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfce5e08 r9:83018205 r8:84e18000 r7:00000000 r6:83018200 r5:00001000 r4:7f555000 r5:85c6d78c r4:85c6d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84cccd80 5fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:8506c000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcfde08 r9:83018205 r8:84e18c00 r7:00000000 r6:83018200 r5:00001000 r4:7f5d1000 r5:8472a78c r4:8472a400 r7:ddde2d80 r6:83018200 r5:8472a78c r4:84ccce80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:56:3248 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:56 state:D stack:0 pid:3248 tgid:3248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcf1d84 r8:00000002 r7:60000113 r6:dfcf1d8c r5:84e19800 r4:84e19800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e19800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85c94800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e19800 r7:00000000 r6:83018200 r5:00001000 r4:7f4f1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfca1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c6ff8c r4:85c6fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c6ff8c r4:84cccf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e19800 r8:84cccfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cccf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cccf80 r8:80287e08 r7:dfcfde60 r6:84ccc400 r5:84e19800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcf1fb0 to 0xdfcf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d83440 INFO: task kworker/1:56:3248 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe060dfb0 to 0xe060dff8) INFO: task kworker/1:57:3251 blocked for more than 451 seconds. r4:84e1a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd01e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8578ef8c r4:8578ec00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e1a400 r8:842e702c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:842e7000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842e7000 r8:80287e08 r7:dfcfde60 r6:842e7080 r5:84e1a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd01fb0 to 0xdfd01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d83980 INFO: task kworker/1:57:3251 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:58 state:D stack:0 pid:3253 tgid:3253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd19d84 r8:00000002 r7:60000013 r6:dfd19d8c r5:84e1b000 r4:84e1b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e1b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd19e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85df90c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e1b000 r7:00000000 r6:83018200 r5:00001000 r4:7f793000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85d9138c r4:85d91000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd60: 80230ad0 80239bb0 80000013 ffffffff [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe060dfb0 to 0xe060dff8) r10:8291a684 r9:dfd0dd84 r8:00000002 r7:60000113 r6:dfd0dd8c r5:84e1bc00 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d18ec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e1bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f64d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6dd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8472af8c r4:8472ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8472af8c r4:842e7200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e1bc00 r8:842e722c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:842e7200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842e7200 r8:80287e08 r7:dfd19e60 r6:842e7280 r5:84e1bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd0dfb0 to 0xdfd0dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd25e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8e5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d3ef8c r4:85d3ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d3ef8c r4:842e7300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e1c800 r8:842e732c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:842e7300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842e7300 r8:80287e08 r7:dfd19e60 r6:842e7380 r5:84e1c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd25fb0 to 0xdfd25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:dfc25000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:61:3258 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:61 state:D stack:0 pid:3258 tgid:3258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:84e1d400 r4:8291a680 r5:00001000 r4:ed9bf000 r5:85b6138c r4:85b61000 r10:61c88647 r9:84e1d400 r8:842e742c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/1:62:3260 blocked for more than 451 seconds. [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85d5578c r4:85d55400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d5578c r4:842e7500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e1ec00 r8:842e752c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:842e7500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842e7500 r8:80287e08 r7:dfd19e60 r6:842e7580 r5:84e1ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd49fb0 to 0xdfd49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:844e0c00 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85921600 r7:dddced80 r6:83018000 r5:858ce78c r4:84e4b500 Exception stack(0xdfd59fb0 to 0xdfd59ff8) Workqueue: events bpf_prog_free_deferred r4:82ac21e4 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:63:3265 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:63 state:D stack:0 pid:3265 tgid:3265 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfd55d84 r8:00000002 r7:60000113 r6:dfd55d8c r5:844e0000 r4:844e0000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844e0000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd55e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ed6b5000 r5:85d65f8c r4:85d65c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85d65f8c r4:842e7680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844e0000 r8:842e76ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:842e7680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842e7680 r8:80287e08 r7:dfd19e60 r6:842e7700 r5:844e0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd55fb0 to 0xdfd55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e4e500 INFO: task kworker/1:63:3265 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 r4:82ac21e4 r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/1:64:3267 blocked for more than 451 seconds. r5:844e2400 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d90f8c r4:85d90c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:844e3000 r4:00000000 r4:00000000 r5:85d90b8c r4:85d90800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:844e3000 r8:842e78ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r5:00001000 r4:dfc25000 r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85d9078c r4:85d90400 r7:ddde2d80 r6:83018200 r5:85d9078c r4:842e7980 Exception stack(0xdf9d5fb0 to 0xdf9d5ff8) task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:84fdf38c r4:84fdf000 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:67:3273 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:67 state:D stack:0 pid:3273 tgid:3273 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:844e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f879000 r5:8473ab8c r4:8473a800 r7:ddde2d80 r6:83018200 r5:8473ab8c r4:842e7a80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:68:3274 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:68 state:D stack:0 pid:3274 tgid:3274 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9e1d84 r8:00000002 r7:60000113 r6:df9e1d8c r5:844e5400 r4:844e5400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844e5400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e0e480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f7bf000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85d9b78c r4:85d9b400 r10:61c88647 r9:844e5400 r8:842e7bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:844e6000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84739f8c r4:84739c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84739f8c r4:842e7c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844e6000 r8:842e7cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:842e7c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842e7c80 r8:80287e08 r7:df9c9e60 r6:842e7d00 r5:844e6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9edfb0 to 0xdf9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ca6000 INFO: task kworker/1:69:3278 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe060dd28 to 0xe060dd70) r5:00001000 r4:dfc25000 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:70:3280 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:70 state:D stack:0 pid:3280 tgid:3280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa31d84 r8:00000002 r7:60000113 r6:dfa31d8c r5:844e6c00 r4:844e6c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844e6c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08 r5:00001000 r4:ed9e5000 r5:8473a38c r4:8473a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:844e6c00 r8:842e7dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 r5:84fdf38c r4:84fdf000 r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:844e1800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa0de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca6d80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f87b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed9b7000 r5:8473a78c r4:8473a400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:72:3284 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:72 state:D stack:0 pid:3284 tgid:3284 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa49d84 r8:00000002 r7:60000113 r6:dfa49d8c r5:84e1e000 r4:84e1e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e1e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e445c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e1e000 r7:00000000 r6:83018200 r5:00001000 r4:7f877000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed913000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8473af8c r4:8473ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8473af8c r4:842e7f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e1e000 r8:842e7fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:842e7f80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe060dd28 to 0xe060dd70) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:73 state:D stack:0 pid:3286 tgid:3286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e44780 r9:83018205 r8:84cd0000 r7:00000000 r6:83018200 r5:00001000 r4:7f875000 r5:8473b38c r4:8473b000 r10:61c88647 r9:84cd0000 r8:84cac0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdfa79fb0 to 0xdfa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ca6480 INFO: task kworker/1:73:3286 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:8506c000 r4:84cd0c00 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:8473b78c r4:84cac180 Workqueue: events bpf_prog_free_deferred [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:75 state:D stack:0 pid:3291 tgid:3291 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa91d84 r8:00000002 r7:60000113 r6:dfa91d8c r5:84cd1800 r4:84cd1800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84cd1800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa91e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8473bb8c r4:8473b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8473bb8c r4:84cac280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cd1800 r8:84cac2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cac280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cac280 r8:80287e08 r7:dfa61e60 r6:84cac300 r5:84cd1800 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84fdf38c r4:84fdf000 r4:8506c000 r5:84e43000 r4:8291a680 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) INFO: task kworker/1:77:3293 blocked for more than 451 seconds. [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8473bf8c r4:8473bc00 9fa0: 00000000 00000000 00000000 00000000 r4:00000000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:85d9bf8c r4:85d9bc00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:79:3297 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:79 state:D stack:0 pid:3297 tgid:3297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb25d84 r8:00000002 r7:60000113 r6:dfb25d8c r5:84e43c00 r4:84e43c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e43c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb25e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca6e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e43c00 r7:00000000 r6:83018200 r5:00001000 r4:7f86b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed781000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84dc4b8c r4:84dc4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84dc4b8c r4:84cac500 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 Exception stack(0xe060dfb0 to 0xe060dff8) r4:84e46000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84e46000 r8:84cac5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe060dd28 to 0xe060dd70) r5:00001000 r4:dfc25000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:dddced80 r6:83018000 r5:858ceb8c r4:84e4b800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e41800 r8:84e4b82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e4b800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e4b800 r8:80287e08 r7:dfc59e60 r6:84e4b880 r5:84e41800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb55fb0 to 0xdfb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cbc0c0 INFO: task kworker/0:16:3301 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r4:e060ddc0 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84dc538c r4:84dc5000 r10:61c88647 r9:84cd2400 r8:84cac62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cac600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cac600 r8:80287e08 r7:dfb25e60 r6:84cac680 r5:84cd2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb11fb0 to 0xdfb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cb51c0 Workqueue: events bpf_prog_free_deferred r4:e060ddc0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:82 state:D stack:0 pid:3306 tgid:3306 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cb5000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84cd3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ea7f8c r4:85ea7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ea7f8c r4:84cac700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cd3c00 r8:84cac72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cac700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cb51c0 INFO: task kworker/1:82:3306 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:85f2b78c r4:85f2b400 r10:61c88647 r9:84cd5400 r8:84cac82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe060dd28 to 0xe060dd70) r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84cd4800 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:84dc5b8c r4:84dc5800 dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 Exception stack(0xe060dfb0 to 0xe060dff8) r4:840ee000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:840ee000 r8:84e2d22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) Exception stack(0xe060dfb0 to 0xe060dff8) r5:84cd6c00 r4:8291a680 r5:00001000 r4:ee84b000 r5:8600e78c r4:8600e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8600e78c r4:84e2d280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cd6c00 r8:84e2d2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e2d280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e2d280 r8:80287e08 r7:dfde9e60 r6:84e2d300 r5:84cd6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfde1fb0 to 0xdfde1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e27c00 INFO: task kworker/1:102:3349 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:8506c000 r5:85005400 r4:8291a680 r9:83018205 r8:85005400 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 r5:84f7a38c r4:84f7a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84f7a38c r4:84e90300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85005400 r8:84e9032c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84e90300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e90300 r8:80287e08 r7:e0551e60 r6:84eed280 r5:85005400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe056dfb0 to 0xe056dff8) dfa0: 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:134:3709 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:134 state:D stack:0 pid:3709 tgid:3709 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:85006c00 r4:00000000 r5:84f79f8c r4:84f79c00 r10:61c88647 r9:85006c00 r8:84e903ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe060dd28 to 0xe060dd70) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Not tainted 6.15.0-rc7-syzkaller #0 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84fdff8c r4:84fdfc00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:84fdf78c r4:84fdf400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf78c r4:84d91900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f76c00 r8:84d9192c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91900 r8:80287e08 r7:e05fde60 r6:84fed580 r5:84f76c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0615fb0 to 0xe0615ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c240 INFO: task kworker/0:202:3790 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd60: 80230ad0 80239bb0 80000013 ffffffff [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85036000 r4:00000000 r5:84f7bb8c r4:84f7b800 r10:61c88647 r9:85036000 r8:84fed62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 task:kworker/1:136 state:D stack:0 pid:3794 tgid:3794 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84f7a78c r4:84f7a400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe060dd28 to 0xe060dd70) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Workqueue: events bpf_prog_free_deferred r4:00000000 r5:84fdfb8c r4:84fdf800 Exception stack(0xe0619fb0 to 0xe0619ff8) dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r4:84d91880 r4:8506c000 r4:84d18c00 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0631e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506cd80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d18c00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe33000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe0f8c r4:84fe0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fe0f8c r4:84d91a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d18c00 r8:84d91a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91a00 r8:80287e08 r7:e05fde60 r6:84fed880 r5:84d18c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c700 INFO: task kworker/0:204:3799 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 Exception stack(0xe060dfb0 to 0xe060dff8) r5:84d19800 r4:8291a680 r9:83018005 r8:84d19800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 r4:84d91a80 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r9:83018005 r8:84d1a400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d1a400 r8:84d91b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91b00 r8:80287e08 r7:e0631e60 r6:84fed980 r5:84d1a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0645fb0 to 0xe0645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c940 INFO: task kworker/0:206:3803 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Not tainted 6.15.0-rc7-syzkaller #0 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84fe0b8c r4:84fe0800 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:84fe178c r4:84fe1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fe178c r4:84d91c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d1bc00 r8:84d91c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91c00 r8:80287e08 r7:e0631e60 r6:84feda80 r5:84d1bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0659fb0 to 0xe0659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Call trace: [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84fe138c r4:84fe1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fe138c r4:84d91c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d1e000 r8:84d91cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91c80 r8:80287e08 r7:e0659e60 r6:84fedb00 r5:84d1e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0681fb0 to 0xe0681ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506cd40 INFO: task kworker/0:209:3810 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:00000000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r10:8291a684 r9:e069dd84 r8:00000002 r7:60000013 r6:e069dd8c r5:84d1ec00 r5:84fe238c r4:84fe2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:84fe1b8c r4:84fe1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fe1b8c r4:84d91d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d1c800 r8:84d91dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91d80 r8:80287e08 r7:e069de60 r6:84fedc00 r5:84d1c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a1fb0 to 0xe06a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506cdc0 INFO: task kworker/0:211:3813 is blocked on a mutex likely owned by task kworker/0:201:3787. Workqueue: events bpf_prog_free_deferred [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:00000001 INFO: task kworker/0:212:3815 blocked for more than 451 seconds. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a5e08 r5:84fe1f8c r4:84fe1c00 r4:84d91e00 r4:8506e100 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r4:84d91880 r4:8506c000 r5:85039800 r4:8291a680 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85039800 r8:84d91eac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506e1c0 INFO: task kworker/0:213:3818 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:8291a684 r9:e06bdd84 r8:00000002 r7:60000113 r6:e06bdd8c r5:8503a400 r5:84fe2b8c r4:84fe2800 r10:61c88647 r9:8503a400 r8:84d91f2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe060dd28 to 0xe060dd70) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Workqueue: events bpf_prog_free_deferred [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8506e1c0 INFO: task kworker/0:215:3821 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9c5bb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 INFO: task kworker/0:216:3822 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:216 state:D stack:0 pid:3822 tgid:3822 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06c9d84 r8:00000002 r7:60000013 r6:e06c9d8c r5:8503bc00 r4:8503bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8503bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c9e08 r5:84fe2f8c r4:84fe2c00 r7:dddced80 r6:83018000 r5:84fe2f8c r4:8507a000 r4:00000001 r4:8506e480 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:217:3824 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:217 state:D stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e059dd84 r8:00000002 r7:60000113 r6:e059dd8c r5:8500c800 r4:8500c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8500c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:84fe338c r4:84fe3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fe338c r4:8507a080 r4:8507a080 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 task:kworker/0:218 state:D stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84fe378c r4:84fe3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:84fdf38c r4:84fdf000 Exception stack(0xe060dfb0 to 0xe060dff8) Workqueue: events bpf_prog_free_deferred r4:8500ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8500ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506ec80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8500ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05a3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe3f8c r4:84fe3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fe3f8c r4:8507a280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8500ec00 r8:8507a2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8507a280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8506e8c0 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84fe878c r4:84fe8400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8507a380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507a380 r8:80287e08 r7:e06d5e60 r6:8507a400 r5:8500d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06d9fb0 to 0xe06d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506eb00 INFO: task kworker/0:220:3832 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe060dfb0 to 0xe060dff8) Workqueue: events bpf_prog_free_deferred [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:8500bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df959000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe838c r4:84fe8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fe838c r4:8507a480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8500bc00 r8:8507a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8507a480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507a480 r8:80287e08 r7:e06d9e60 r6:8507a500 r5:8500bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06ddfb0 to 0xe06ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8500b000 r4:8291a680 r9:83018005 r8:8500b000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 r7:dddced80 r6:83018000 r5:84fe8f8c r4:8507a580 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:223:3837 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:84fe8b8c r4:84fe8800 Exception stack(0xe00e1fb0 to 0xe00e1ff8) dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84c51800 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c51800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe938c r4:84fe9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fe938c r4:8507a780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c51800 r8:8507a7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8507a780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507a780 r8:80287e08 r7:e00d5e60 r6:8507a800 r5:84c51800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00f9fb0 to 0xe00f9ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:850891c0 dd60: 80230ad0 80239bb0 80000013 ffffffff [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:8291a684 r9:e0111d84 r8:00000002 r7:60000113 r6:e0111d8c r5:84d00000 r5:84fe978c r4:84fe9400 r10:00000000 r9:8507a880 r8:80287e08 r7:e00f9e60 r6:8507a900 r5:84d00000 dd60: 80230ad0 80239bb0 80000013 ffffffff r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r9:83018005 r8:84d01800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 r10:61c88647 r9:84d01800 r8:8507a9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8507a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507a980 r8:80287e08 r7:e0111e60 r6:8507aa00 r5:84d01800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0669fb0 to 0xe0669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85089100 INFO: task kworker/0:226:3843 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:227:3845 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:227 state:D stack:0 pid:3845 tgid:3845 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0129d84 r8:00000002 r7:60000113 r6:e0129d8c r5:84d02400 r4:84d02400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d02400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0129e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850897c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d02400 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe73000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fe9f8c r4:84fe9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fe9f8c r4:8507aa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d02400 r8:8507aaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8507aa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507aa80 r8:80287e08 r7:e0669e60 r6:8507ab00 r5:84d02400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0129fb0 to 0xe0129ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 r5:84fdf38c r4:84fdf000 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0141e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84feab8c r4:84fea800 r4:8507ab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507ab80 r8:80287e08 r7:e0129e60 r6:8507ac00 r5:84d03000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0141fb0 to 0xe0141ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85089640 INFO: task kworker/0:228:3847 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) INFO: task kworker/0:229:3848 blocked for more than 452 seconds. [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:dfed3000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84fea38c r4:8507ac80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe060dd28 to 0xe060dd70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:230 state:D stack:0 pid:3851 tgid:3851 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8507ad80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:231:3853 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:231 state:D stack:0 pid:3853 tgid:3853 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06edd84 r8:00000002 r7:60000113 r6:e06edd8c r5:84d05400 r4:84d05400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d05400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06ede08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85089e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d05400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0101000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84feaf8c r4:84feac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84feaf8c r4:8507ae80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d05400 r8:8507aeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8507ae80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507ae80 r8:80287e08 r7:e0141e60 r6:8507af00 r5:84d05400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06edfb0 to 0xe06edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85089ac0 INFO: task kworker/0:231:3853 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:232:3855 blocked for more than 452 seconds. [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84feb38c r4:84feb000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84feb38c r4:8507af80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d06000 r8:8507afac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8507af80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8507af80 r8:80287e08 r7:e06ede60 r6:850d9000 r5:84d06000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06f1fb0 to 0xe06f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85089c40 INFO: task kworker/0:232:3855 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r4:84d06c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f5e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe060dfb0 to 0xe060dff8) INFO: task kworker/0:234:3860 blocked for more than 452 seconds. r4:84d00c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d00c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850dd040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d00c00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0175000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84febb8c r4:84feb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84febb8c r4:850d9180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d00c00 r8:850d91ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850d9180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d9180 r8:80287e08 r7:e06f5e60 r6:850d9200 r5:84d00c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06f9fb0 to 0xe06f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850dd080 INFO: task kworker/0:234:3860 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:850d9280 r8:80287e08 r7:e06f9e60 r6:850d9300 r5:85018000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe060dd28 to 0xe060dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85018c00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850dd500 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85018c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01a1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509c38c r4:8509c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8509c38c r4:850d9380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85018c00 r8:850d93ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850d9380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d9380 r8:80287e08 r7:e06fde60 r6:850d9400 r5:85018c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e9fb0 to 0xe06e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850dd180 INFO: task kworker/0:236:3863 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:237:3865 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:237 state:D stack:0 pid:3865 tgid:3865 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0701d84 r8:00000002 r7:60000013 r6:e0701d8c r5:85019800 r4:85019800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85019800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0701e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850dd7c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85019800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509cb8c r4:8509c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8509cb8c r4:850d9480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85019800 r8:850d94ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850d9480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d9480 r8:80287e08 r7:e06e9e60 r6:850d9500 r5:85019800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0701fb0 to 0xe0701ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850dd180 INFO: task kworker/0:237:3865 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe060dfb0 to 0xe060dff8) r4:8506c000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e01b9000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8501a400 r8:850d95ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:82ac21e4 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:239:3869 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:239 state:D stack:0 pid:3869 tgid:3869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0711d84 r8:00000002 r7:60000013 r6:e0711d8c r5:8501b000 r4:8501b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8501b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0711e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850dd940 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509cf8c r4:8509cc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe0711fb0 to 0xe0711ff8) task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:8506c000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e05cb000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8501bc00 r8:850d982c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0719e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ddc40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8501c800 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509d78c r4:8509d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8509d78c r4:850d9780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501c800 r8:850d97ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850d9780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d9780 r8:80287e08 r7:e0715e60 r6:850d9900 r5:8501c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0719fb0 to 0xe0719ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850dd8c0 INFO: task kworker/0:241:3873 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:242:3875 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:242 state:D stack:0 pid:3875 tgid:3875 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0705d84 r8:00000002 r7:60000113 r6:e0705d8c r5:8501e000 r4:8501e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8501e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0705e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850dd8c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8501e000 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0633000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509df8c r4:8509dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe060dd28 to 0xe060dd70) r4:82ac21e4 r4:00000000 r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:243:3876 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:243 state:D stack:0 pid:3876 tgid:3876 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0725d84 r8:00000002 r7:60000113 r6:e0725d8c r5:8501ec00 r4:8501ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8501ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0725e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850dde80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8501ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509db8c r4:8509d800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r5:8501d400 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:82ac21e4 r4:00000000 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:8506c000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:e0679000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509e78c r4:8509e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8509e78c r4:850d9c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85118000 r8:850d9cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850d9c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d9c80 r8:80287e08 r7:e0721e60 r6:850d9d00 r5:85118000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe072dfb0 to 0xe072dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ed180 INFO: task kworker/0:245:3882 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:246:3884 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:246 state:D stack:0 pid:3884 tgid:3884 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0731d84 r8:00000002 r7:60000113 r6:e0731d8c r5:85118c00 r4:85118c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85118c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0731e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850edc00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85118c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbdd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509f78c r4:8509f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8509f78c r4:850d9d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85118c00 r8:850d9dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850d9d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d9d80 r8:80287e08 r7:e0721e60 r6:850d9e00 r5:85118c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0731fb0 to 0xe0731ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ed1c0 INFO: task kworker/0:246:3884 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:84f7ab8c r4:84fedf00 r4:84fedf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fedf00 r8:80287e08 r7:e0611e60 r6:850d9e80 r5:8511a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0745fb0 to 0xe0745ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85096f00 INFO: task kworker/1:137:3885 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:247:3887 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:e0749d84 r8:00000002 r7:60000013 r6:e0749d8c r5:8511b000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509ef8c r4:8509ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe060dd28 to 0xe060dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:138:3889 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:138 state:D stack:0 pid:3889 tgid:3889 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0761d84 r8:00000002 r7:60000113 r6:e0761d8c r5:8511c800 r4:8511c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8511c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0761e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850960c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8511c800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc91000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f7af8c r4:84f7ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84f7af8c r4:84fedf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8511c800 r8:84fedfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84fedf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84fedf80 r8:80287e08 r7:e0611e60 r6:850ef000 r5:8511c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0761fb0 to 0xe0761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r5:84fdf38c r4:84fdf000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:e05c5d84 r8:00000002 r7:60000113 r6:e05c5d8c r5:8511d400 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509fb8c r4:8509f800 r10:61c88647 r9:8511d400 r8:850ef0ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe060dd28 to 0xe060dd70) r4:82ac21e4 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:8503ec00 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8503ec00 r8:850ef1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850ef180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ef180 r8:80287e08 r7:e05c5e60 r6:850f0000 r5:8503ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0729fb0 to 0xe0729ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850edc80 INFO: task kworker/0:249:3895 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:250:3897 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:250 state:D stack:0 pid:3897 tgid:3897 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06a9d84 r8:00000002 r7:60000013 r6:e06a9d8c r5:85038000 r4:85038000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85038000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d0500 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85038000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd5d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850ac78c r4:850ac400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850ac78c r4:850ef200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85038000 r8:850ef22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850ef200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ef200 r8:80287e08 r7:e0729e60 r6:850f0080 r5:85038000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850edd00 INFO: task kworker/0:250:3897 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:251:3899 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:251 state:D stack:0 pid:3899 tgid:3899 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:8503d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e053de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:850ede80 INFO: task kworker/0:251:3899 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) task:kworker/1:139 state:D stack:0 pid:3901 tgid:3901 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0765e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84f7b38c r4:84f7b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:140:3903 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:140 state:D stack:0 pid:3903 tgid:3903 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0739d84 r8:00000002 r7:60000113 r6:e0739d8c r5:85038c00 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85038c00 r8:850f02ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) INFO: task kworker/0:252:3904 blocked for more than 452 seconds. r5:8503c800 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:850acb8c r4:850ef300 r10:61c88647 r9:8503c800 r8:850ef32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850ef300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ef300 r8:80287e08 r7:e06a9e60 r6:850f0380 r5:8503c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe076dfb0 to 0xe076dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850ed7c0 INFO: task kworker/0:252:3904 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:e0779d84 r8:00000002 r7:60000013 r6:e0779d8c r5:85021800 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850acf8c r4:850acc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe0779fb0 to 0xe0779ff8) task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 INFO: task kworker/0:254:3910 blocked for more than 452 seconds. r5:85023000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:850adf8c r4:850ef400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe060dd28 to 0xe060dd70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:255:3911 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:255 state:D stack:0 pid:3911 tgid:3911 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0789d84 r8:00000002 r7:60000013 r6:e0789d8c r5:85023c00 r4:85023c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85023c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0789e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e5400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85023c00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850ad38c r4:850ad000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850ad38c r4:850ef480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85023c00 r8:850ef4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850ef480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ef480 r8:80287e08 r7:e0785e60 r6:850f0500 r5:85023c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0789fb0 to 0xe0789ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850e5100 INFO: task kworker/0:255:3911 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8506c000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:257:3915 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:257 state:D stack:0 pid:3915 tgid:3915 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0799d84 r8:00000002 r7:60000013 r6:e0799d8c r5:85020000 r4:85020000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85020000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0799e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e56c0 r5:00001000 r4:dfffd000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:850adb8c r4:850ef580 Exception stack(0xe0799fb0 to 0xe0799ff8) task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07a1e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850ae38c r4:850ae000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850ae38c r4:850ef600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020c00 r8:850ef62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850ef600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ef600 r8:80287e08 r7:e0785e60 r6:850f0680 r5:85020c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07a1fb0 to 0xe07a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850e5640 INFO: task kworker/0:258:3917 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9ca0c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e05ff000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:850af78c r4:850ef680 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe060dd28 to 0xe060dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:260 state:D stack:0 pid:3921 tgid:3921 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850ae78c r4:850ae400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850ae78c r4:850ef700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85040000 r8:850ef72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850ef700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ef700 r8:80287e08 r7:e07ade60 r6:850f0780 r5:85040000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07b1fb0 to 0xe07b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850e5840 INFO: task kworker/0:260:3921 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9cc39000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:850ef780 r8:80287e08 r7:e07ade60 r6:850f0800 r5:85040c00 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85042400 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:850aef8c r4:850aec00 r4:850ef800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9cc39000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:263:3926 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:263 state:D stack:0 pid:3926 tgid:3926 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0769d84 r8:00000002 r7:60000013 r6:e0769d8c r5:8511bc00 r4:8511bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8511bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0769e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:82ac21e4 r4:00000000 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:8506c000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9cc39000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:265:3931 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:265 state:D stack:0 pid:3931 tgid:3931 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07c9d84 r8:00000002 r7:60000013 r6:e07c9d8c r5:8511e000 r4:8511e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8511e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07c9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8511e000 r8:850efaac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) Not tainted 6.15.0-rc7-syzkaller #0 r5:85119800 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850b038c r4:850b0000 r7:dddced80 r6:83018000 r5:850b038c r4:850efb80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe060dd28 to 0xe060dd70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r5:84fdf38c r4:84fdf000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:e07e9d84 r8:00000002 r7:60000113 r6:e07e9d8c r5:84ed0c00 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:850b078c r4:850b0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:269:3940 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:269 state:D stack:0 pid:3940 tgid:3940 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0811d84 r8:00000002 r7:60000113 r6:e0811d8c r5:85041800 r4:85041800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85041800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0811e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851097c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85041800 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07fb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850b0f8c r4:850b0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b0f8c r4:850efe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85041800 r8:850efeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850efe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850efe80 r8:80287e08 r7:e07cde60 r6:850f0900 r5:85041800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0811fb0 to 0xe0811ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85109540 INFO: task kworker/0:269:3940 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9cc39000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:270:3941 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:270 state:D stack:0 pid:3941 tgid:3941 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0829d84 r8:00000002 r7:60000113 r6:e0829d8c r5:85043000 r4:85043000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85043000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851098c0 r5:850b138c r4:850b1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85043000 r8:850eff2c r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:8506c000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:850b378c r4:850b3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b378c r4:850eff80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85045400 r8:850effac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850eff80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850eff80 r8:80287e08 r7:e0829e60 r6:850f0a00 r5:85045400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0835fb0 to 0xe0835ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85109800 INFO: task kworker/0:271:3943 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9cc39000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85046000 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85109a40 r5:850b178c r4:850b1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 INFO: task kworker/0:273:3946 blocked for more than 453 seconds. [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 r5:850b1b8c r4:850b1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85115080 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:274:3948 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:274 state:D stack:0 pid:3948 tgid:3948 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0879d84 r8:00000002 r7:60000113 r6:e0879d8c r5:85026000 r4:85026000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85026000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0879e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85109cc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85026000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e085b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850b1f8c r4:850b1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b1f8c r4:85115100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85026000 r8:8511512c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85115100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85115100 r8:80287e08 r7:e0835e60 r6:850f0b80 r5:85026000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0879fb0 to 0xe0879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85109c00 INFO: task kworker/0:274:3948 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 dd60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:275:3950 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:275 state:D stack:0 pid:3950 tgid:3950 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e488dd84 r8:00000002 r7:60000013 r6:e488dd8c r5:85022400 r4:85022400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85022400 r4:8291a680 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85022400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4881000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850b238c r4:850b2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b238c r4:85115180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:851151ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85115180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85115180 r8:80287e08 r7:e0835e60 r6:850f0c00 r5:85022400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe488dfb0 to 0xe488dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85109ac0 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) INFO: task kworker/0:276:3952 blocked for more than 453 seconds. r5:85044800 r4:8291a680 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:850b278c r4:850b2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85044800 r8:8511522c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85109c40 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:277:3954 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:277 state:D stack:0 pid:3954 tgid:3954 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e48a5d84 r8:00000002 r7:60000013 r6:e48a5d8c r5:85048000 r4:85048000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85048000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:850b2b8c r4:850b2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b2b8c r4:85115280 r10:61c88647 r9:85048000 r8:851152ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe060dfb0 to 0xe060dff8) Not tainted 6.15.0-rc7-syzkaller #0 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 r5:850b2f8c r4:850b2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85049800 r8:8511532c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 r5:00001000 r4:dfc25000 r4:84d91880 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:279:3958 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:279 state:D stack:0 pid:3958 tgid:3958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e48f1d84 r8:00000002 r7:60000013 r6:e48f1d8c r5:85048c00 r4:85048c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85048c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48f1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515d040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85048c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48d9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850b338c r4:850b3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b338c r4:85115380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85048c00 r8:851153ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85115380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85115380 r8:80287e08 r7:e0835e60 r6:850f0e00 r5:85048c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48f1fb0 to 0xe48f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8515d080 INFO: task kworker/0:279:3958 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9cc39000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 Not tainted 6.15.0-rc7-syzkaller #0 r4:8504b000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07e1e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:850b3b8c r4:850b3800 r10:61c88647 r9:8504b000 r8:851154ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 dd60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 INFO: task kworker/0:281:3964 blocked for more than 453 seconds. r4:8504bc00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e890de08 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515d640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8504bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e890f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850b3f8c r4:850b3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b3f8c r4:85115400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8504bc00 r8:8511542c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85115400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85115400 r8:80287e08 r7:e07e1e60 r6:850f0f00 r5:8504bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe890dfb0 to 0xe890dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8515d300 INFO: task kworker/0:281:3964 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9cc39000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:141:3965 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:141 state:D stack:0 pid:3965 tgid:3965 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e8919d84 r8:00000002 r7:60000113 r6:e8919d8c r5:8504c800 r4:8504c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8504c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8919e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515d9c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8504c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8937000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850b4b8c r4:850b4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850b4b8c r4:850f0f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8504c800 r8:850f0fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850f0f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850f0f80 r8:80287e08 r7:e0611e60 r6:85160000 r5:8504c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8919fb0 to 0xe8919ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85151cc0 INFO: task kworker/1:141:3965 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9cc39000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) Not tainted 6.15.0-rc7-syzkaller #0 r5:8504d400 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:850b438c r4:850b4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85115500 5fa0: 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 r5:84fdf38c r4:84fdf000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8506c000 task:kworker/0:283 state:D stack:0 pid:3969 tgid:3969 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e8929d84 r8:00000002 r7:60000113 r6:e8929d8c r5:8504e000 r4:8504e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8504e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8929e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515d900 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8504e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e892b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850b478c r4:850b4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b478c r4:85115580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8504e000 r8:851155ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85115580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85115580 r8:80287e08 r7:e8925e60 r6:85160100 r5:8504e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8929fb0 to 0xe8929ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8515d5c0 INFO: task kworker/0:283:3969 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9cc39000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:284:3971 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:284 state:D stack:0 pid:3971 tgid:3971 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e8935d84 r8:00000002 r7:60000013 r6:e8935d8c r5:8504ec00 r4:8504ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8504ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8935e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515dbc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8504ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e893f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850b4f8c r4:850b4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b4f8c r4:85115600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8504ec00 r8:8511562c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85115600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85115600 r8:80287e08 r7:e8929e60 r6:85160180 r5:8504ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8935fb0 to 0xe8935ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8515d2c0 INFO: task kworker/0:284:3971 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9cc39000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r4:e060ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8506c000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48e1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515dd00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8504a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e894b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850b538c r4:850b5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b538c r4:85115680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8504a400 r8:851156ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85115680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85115680 r8:80287e08 r7:e8935e60 r6:85160200 r5:8504a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48e1fb0 to 0xe48e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8515d880 INFO: task kworker/0:285:3972 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r4:00000000 r5:84fdf38c r4:84fdf000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85025400 r4:8291a680 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:850b738c r4:850b7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85025400 r8:851602ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9cc39000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e8957000 r5:850b578c r4:850b5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85043c00 r8:8511572c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8515db80 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8506c000 task:kworker/0:287 state:D stack:0 pid:3979 tgid:3979 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:850b5b8c r4:850b5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85050000 r8:851157ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8515d980 INFO: task kworker/0:287:3979 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9cc39000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:288:3981 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:288 state:D stack:0 pid:3981 tgid:3981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e896dd84 r8:00000002 r7:60000113 r6:e896dd8c r5:85050c00 r4:85050c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85050c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e896de08 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r9:83018005 r8:85050c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e896f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850b5f8c r4:850b5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b5f8c r4:85115800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85050c00 r8:8511582c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85115800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85115800 r8:80287e08 r7:e8969e60 r6:85160480 r5:85050c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe896dfb0 to 0xe896dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8515d980 INFO: task kworker/0:288:3981 is blocked on a mutex likely owned by task kworker/0:201:3787. Exception stack(0xe060dd28 to 0xe060dd70) r4:82ac21e4 r4:00000000 r5:84fdf38c r4:84fdf000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ed3000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8979e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85156200 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ed3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea989000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850b638c r4:850b6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b638c r4:85115880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ed3000 r8:851158ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85115880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85115880 r8:80287e08 r7:e896de60 r6:85115900 r5:84ed3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8979fb0 to 0xe8979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8515df80 INFO: task kworker/0:289:3983 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9cc39000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:290:3986 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:290 state:D stack:0 pid:3986 tgid:3986 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea999d84 r8:00000002 r7:60000113 r6:ea999d8c r5:84ed2400 r4:84ed2400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ed2400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea999e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851566c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ed2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 r5:850b6b8c r4:850b6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84ed2400 r8:851159ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9cc39000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ea995000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850b678c r4:850b6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b678c r4:85115a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ed1800 r8:85115aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85115a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85115a80 r8:80287e08 r7:ea999e60 r6:85115b00 r5:84ed1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea99dfb0 to 0xea99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85156080 INFO: task kworker/0:291:3987 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r5:00001000 r4:dfc25000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:84ed4800 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:850b6f8c r4:850b6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b6f8c r4:85115b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ed4800 r8:85115bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85115b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85115b80 r8:80287e08 r7:ea999e60 r6:85115c00 r5:84ed4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9b1fb0 to 0xea9b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85156540 INFO: task kworker/0:292:3990 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9cc39000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaa09000 r5:850b7f8c r4:850b7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85115c80 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) INFO: task kworker/0:294:3994 blocked for more than 453 seconds. r4:84ed6c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ed6c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9cde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85156a00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ed6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9e5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850b778c r4:850b7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b778c r4:85115d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ed6c00 r8:85115dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85115d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85115d80 r8:80287e08 r7:ea9c1e60 r6:85115e00 r5:84ed6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9cdfb0 to 0xea9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85156b80 INFO: task kworker/0:294:3994 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9cc39000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:84fdf38c r4:84fdf000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85130000 r4:8291a680 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84f7bf8c r4:84f7bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84f7bf8c r4:85160500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85130000 r8:8516052c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85160500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85160500 r8:80287e08 r7:e8949e60 r6:85115e80 r5:85130000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9d1fb0 to 0xea9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85151300 INFO: task kworker/1:143:3995 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9cc39000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) Not tainted 6.15.0-rc7-syzkaller #0 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851572c0 r5:84718b8c r4:84718800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85132400 r8:851605ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85175780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85133000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc41000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8471938c r4:84719000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8471938c r4:85160600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85133000 r8:8516062c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85160600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85160600 r8:80287e08 r7:ea9ede60 r6:85115f80 r5:85133000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f5fb0 to 0xea9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85157000 INFO: task kworker/1:145:3999 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9cc39000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8506c000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:850b7b8c r4:850b7800 r10:61c88647 r9:85131800 r8:8511302c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 dd60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa0de08 r5:00001000 r4:df9db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8471b38c r4:8471b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8471b38c r4:85160680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85134800 r8:851606ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85160680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85160680 r8:80287e08 r7:ea9f5e60 r6:85113100 r5:85134800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa0dfb0 to 0xeaa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85157000 INFO: task kworker/1:146:4003 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9cc39000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:296:4005 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:296 state:D stack:0 pid:4005 tgid:4005 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa19d84 r8:00000002 r7:60000113 r6:eaa19d8c r5:85135400 r4:85135400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85135400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa19e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851105c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85135400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa15000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850c038c r4:850c0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c038c r4:85113180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85135400 r8:851131ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85113180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85113180 r8:80287e08 r7:ea9c1e60 r6:85113200 r5:85135400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa19fb0 to 0xeaa19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:297:4006 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:297 state:D stack:0 pid:4006 tgid:4006 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa25d84 r8:00000002 r7:60000113 r6:eaa25d8c r5:85133c00 r4:85133c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85133c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa25e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85110940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85133c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa15000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850c0b8c r4:850c0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c0b8c r4:85113280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: 9cc39000 eca69000 00000001 80239b98 7f23f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r5:84fdf38c r4:84fdf000 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:298:4008 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:298 state:D stack:0 pid:4008 tgid:4008 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0735d84 r8:00000002 r7:60000013 r6:e0735d8c r5:85130c00 r4:85130c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85130c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0735e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85110840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85130c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df989000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:850c078c r4:850c0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85113380 5fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 dd60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r5:84fdf38c r4:84fdf000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:e0741d84 r8:00000002 r7:60000113 r6:e0741d8c r5:85053000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:850c1f8c r4:850c1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85053000 r8:8511342c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85110740 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:300:4012 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:300 state:D stack:0 pid:4012 tgid:4012 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0751d84 r8:00000002 r7:60000113 r6:e0751d8c r5:85051800 r4:85051800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85051800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0751e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85110ac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85051800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaa5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850c0f8c r4:850c0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c0f8c r4:85113480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85051800 r8:851134ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85113480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85113480 r8:80287e08 r7:e0741e60 r6:85160800 r5:85051800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0751fb0 to 0xe0751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85110740 INFO: task kworker/0:300:4012 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9cc39000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:8506c000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85052400 r4:8291a680 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa29e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85110c00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85052400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb35000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850c138c r4:850c1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c138c r4:85113500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85052400 r8:8511352c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85113500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85113500 r8:80287e08 r7:e0741e60 r6:85160880 r5:85052400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa29fb0 to 0xeaa29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851108c0 INFO: task kworker/0:301:4014 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9cc39000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:302 state:D stack:0 pid:4015 tgid:4015 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:850c178c r4:850c1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85054800 r8:851135ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85110b00 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80000013 ffffffff r4:e060ddc0 r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:303:4019 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:303 state:D stack:0 pid:4019 tgid:4019 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9e9d84 r8:00000002 r7:60000013 r6:ea9e9d8c r5:85055400 r4:85055400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85055400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85110ec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85055400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfec7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850c1b8c r4:850c1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c1b8c r4:85113600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85055400 r8:8511362c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85113600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85113600 r8:80287e08 r7:e0741e60 r6:85160980 r5:85055400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9e9fb0 to 0xea9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85110cc0 INFO: task kworker/0:303:4019 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9cc39000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:304:4022 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:304 state:D stack:0 pid:4022 tgid:4022 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07edd84 r8:00000002 r7:60000113 r6:e07edd8c r5:85136c00 r4:85136c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85136c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07ede08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851564c0 r5:850c238c r4:850c2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c238c r4:85113680 r4:85113680 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9d335000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 Exception stack(0xe060dfb0 to 0xe060dff8) Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eaa35d84 r8:00000002 r7:60000113 r6:eaa35d8c r5:85136000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:850c278c r4:850c2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c278c r4:85113780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85136000 r8:851137ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85113780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85113780 r8:80287e08 r7:e07ede60 r6:85113800 r5:85136000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa35fb0 to 0xeaa35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85110f00 INFO: task kworker/0:305:4024 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9d335000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ed3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0165000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850c2b8c r4:850c2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c2b8c r4:85113880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ed3c00 r8:851138ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85113880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85113880 r8:80287e08 r7:eaa35e60 r6:85113900 r5:84ed3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa31fb0 to 0xeaa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85110f00 INFO: task kworker/0:306:4026 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9d335000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 INFO: task kworker/0:307:4028 blocked for more than 453 seconds. r4:84ed5400 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515a300 r5:850c2f8c r4:850c2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c2f8c r4:85113980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8515a040 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:308:4031 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:308 state:D stack:0 pid:4031 tgid:4031 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa3dd84 r8:00000002 r7:60000113 r6:eaa3dd8c r5:85140000 r4:85140000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85140000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa3de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515a440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85140000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e019f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850c338c r4:850c3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c338c r4:85113a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85140000 r8:85113aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85113a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85113a80 r8:80287e08 r7:eaa39e60 r6:85113b00 r5:85140000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa3dfb0 to 0xeaa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8515a180 INFO: task kworker/0:308:4031 is blocked on a mutex likely owned by task kworker/0:201:3787. Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) Not tainted 6.15.0-rc7-syzkaller #0 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515a600 r5:850c378c r4:850c3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85140c00 r8:85113bac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd20: 9d335000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:310:4034 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:310 state:D stack:0 pid:4034 tgid:4034 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa45d84 r8:00000002 r7:60000013 r6:eaa45d8c r5:85141800 r4:85141800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:850c3b8c r4:850c3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:8506c000 task:kworker/0:311 state:D stack:0 pid:4035 tgid:4035 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:850c838c r4:850c8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85113d80 r8:80287e08 r7:eaa45e60 r6:85113e00 r5:85143000 r4:8515a5c0 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:312:4037 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:312 state:D stack:0 pid:4037 tgid:4037 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa51d84 r8:00000002 r7:60000013 r6:eaa51d8c r5:85053c00 r4:85053c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85053c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa51e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515aa00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85053c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05b9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850c3f8c r4:850c3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c3f8c r4:85113e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85053c00 r8:85113eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85113e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85113e80 r8:80287e08 r7:eaa4de60 r6:85160a00 r5:85053c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa51fb0 to 0xeaa51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8515a940 INFO: task kworker/0:312:4037 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9d335000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) INFO: task kworker/0:313:4040 blocked for more than 453 seconds. task:kworker/0:313 state:D stack:0 pid:4040 tgid:4040 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa5dd84 r8:00000002 r7:60000113 r6:eaa5dd8c r5:85056c00 r4:85056c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85056c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa5de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515ac80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85056c00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05f7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850c878c r4:850c8400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c878c r4:85113f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85056c00 r8:85113f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85113f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85113f00 r8:80287e08 r7:eaa4de60 r6:85160a80 r5:85056c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8515a9c0 Workqueue: events bpf_prog_free_deferred dd20: 9d335000 eca69000 00000001 80239b98 7f23f000 00000001 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:314:4043 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:314 state:D stack:0 pid:4043 tgid:4043 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa69d84 r8:00000002 r7:60000113 r6:eaa69d8c r5:84cf1800 r4:84cf1800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa69e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515aec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cf1800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e068f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850c8f8c r4:850c8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c8f8c r4:85113f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cf1800 r8:85113fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85113f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeaa69fb0 to 0xeaa69ff8) Workqueue: events bpf_prog_free_deferred dd20: 9d335000 eca69000 00000001 80239b98 7f23f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:850c8b8c r4:8516b000 r4:00000001 r4:8515ab80 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:316:4046 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:316 state:D stack:0 pid:4046 tgid:4046 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa49d84 r8:00000002 r7:60000113 r6:eaa49d8c r5:85143c00 r4:85143c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85143c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa49e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:85143c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 r5:850c938c r4:850c9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8516b080 Exception stack(0xeaa49fb0 to 0xeaa49ff8) task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85144800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 r5:850c978c r4:850c9400 r10:61c88647 r9:85144800 r8:8516b1ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) INFO: task kworker/0:318:4050 blocked for more than 453 seconds. Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa75d84 r8:00000002 r7:60000113 r6:eaa75d8c r5:85145400 r4:85145400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85145400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa75e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85171280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85145400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa83000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850c9b8c r4:850c9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c9b8c r4:8516b280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85145400 r8:8516b2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8516b280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516b280 r8:80287e08 r7:eaa71e60 r6:8516b300 r5:85145400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa75fb0 to 0xeaa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851711c0 INFO: task kworker/0:318:4050 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9d335000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:850c9f8c r4:850c9c00 r4:8516b380 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:320:4054 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:320 state:D stack:0 pid:4054 tgid:4054 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa8dd84 r8:00000002 r7:60000113 r6:eaa8dd8c r5:85146c00 r4:85146c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85146c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa8de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85171dc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85146c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaae7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850cb78c r4:850cb400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850cb78c r4:8516b480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85146c00 r8:8516b4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8516b480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516b480 r8:80287e08 r7:eaa81e60 r6:8516b500 r5:85146c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa8dfb0 to 0xeaa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85171340 INFO: task kworker/0:320:4054 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9d335000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85142400 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 r5:850ca38c r4:850ca000 r10:61c88647 r9:85142400 r8:8516b5ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:322:4057 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:322 state:D stack:0 pid:4057 tgid:4057 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa55d84 r8:00000002 r7:60000113 r6:eaa55d8c r5:84c98000 r4:84c98000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c98000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa55e08 r9:83018005 r8:84c98000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 r5:850ca78c r4:850ca400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8516b680 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:84c98c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 r5:850cab8c r4:850ca800 r10:61c88647 r9:84c98c00 r8:8516b7ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:324:4063 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:324 state:D stack:0 pid:4063 tgid:4063 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaac5d84 r8:00000002 r7:60000113 r6:eaac5d8c r5:84c99800 r4:84c99800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c99800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85171a40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c99800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaacf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850caf8c r4:850cac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850caf8c r4:8516b880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c99800 r8:8516b8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8516b880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516b880 r8:80287e08 r7:eaa8de60 r6:8516b900 r5:84c99800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac5fb0 to 0xeaac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 INFO: task kworker/0:325:4064 blocked for more than 453 seconds. [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 r5:850cb38c r4:850cb000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8516b980 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r4:00000000 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 INFO: task kworker/0:326:4066 blocked for more than 453 seconds. r10:8291a684 r9:eaae5d84 r8:00000002 r7:60000013 r6:eaae5d8c r5:84c9b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c9b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae5e08 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8520478c r4:85204400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520478c r4:8516ba80 r4:8516ba80 Exception stack(0xeaae5fb0 to 0xeaae5ff8) Workqueue: events bpf_prog_free_deferred dd20: 9d335000 eca69000 00000001 80239b98 7f23f000 00000001 r4:00000000 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:8506c000 task:kworker/0:327 state:D stack:0 pid:4068 tgid:4068 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:850cbb8c r4:850cb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8516bb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) INFO: task kworker/0:328:4071 blocked for more than 453 seconds. [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850cbf8c r4:850cbc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850cbf8c r4:8516bc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c9c800 r8:8516bcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8516bc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516bc80 r8:80287e08 r7:eaae5e60 r6:8516bd00 r5:84c9c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab09fb0 to 0xeab09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85187000 INFO: task kworker/0:328:4071 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9d335000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:329:4073 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:329 state:D stack:0 pid:4073 tgid:4073 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:84c9d400 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8520438c r4:85204000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520438c r4:8516bd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c9d400 r8:8516bdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8516bd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516bd80 r8:80287e08 r7:eaae5e60 r6:8516be00 r5:84c9d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab21fb0 to 0xeab21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85187240 INFO: task kworker/0:329:4073 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9d335000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab15e08 r9:83018005 r8:84c9e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0df000 r5:85204b8c r4:85204800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85187240 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:eab2dd84 r8:00000002 r7:60000013 r6:eab2dd8c r5:84c9ec00 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8520538c r4:85205000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85187180 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 INFO: task kworker/0:332:4078 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:332 state:D stack:0 pid:4078 tgid:4078 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab39d84 r8:00000002 r7:60000013 r6:eab39d8c r5:85148000 r4:85148000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85148000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab39e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85187580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85148000 r7:00000000 r6:83018000 r5:00001000 r4:7f0e1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab2f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85204f8c r4:85204c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85204f8c r4:851c9080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85148000 r8:851c90ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851c9080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c9080 r8:80287e08 r7:eab2de60 r6:851c9100 r5:85148000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab39fb0 to 0xeab39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85187400 INFO: task kworker/0:332:4078 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9d335000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:333:4080 blocked for more than 453 seconds. Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8520578c r4:85205400 r10:61c88647 r9:85148c00 r8:851c91ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e060ddc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 Not tainted 6.15.0-rc7-syzkaller #0 r4:85149800 r4:00000000 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85205b8c r4:851c9280 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:82ac21e4 r4:00000000 r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:335:4084 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:335 state:D stack:0 pid:4084 tgid:4084 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab55d84 r8:00000002 r7:60000113 r6:eab55d8c r5:8514a400 r4:8514a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8514a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab55e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85161040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8514a400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb73000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520738c r4:85207000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520738c r4:851c9380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8514a400 r8:851c93ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851c9380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeab55fb0 to 0xeab55ff8) Workqueue: events bpf_prog_free_deferred dd20: 9d335000 eca69000 00000001 80239b98 7f23f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:eab61d84 r8:00000002 r7:60000113 r6:eab61d8c r5:84cf3000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:84718f8c r4:84718c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9d335000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8471978c r4:84719400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 Exception stack(0xe060dfb0 to 0xe060dff8) [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r9:83018005 r8:84cf0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdcd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8520638c r4:85206000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8520638c r4:851c9480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cf0c00 r8:851c94ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851c9480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c9480 r8:80287e08 r7:eab55e60 r6:85160e00 r5:84cf0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07a5fb0 to 0xe07a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85187f40 INFO: task kworker/0:336:4092 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d2040 r7:ddde2d80 r6:83018200 r5:8519438c r4:85160e80 r10:61c88647 r9:84cf4800 r8:85160eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85160e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85160e80 r8:80287e08 r7:e079de60 r6:85160f00 r5:84cf4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe077dfb0 to 0xe077dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85175a80 INFO: task kworker/1:149:4093 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 Exception stack(0xe060dd28 to 0xe060dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe060dfb0 to 0xe060dff8) INFO: task kworker/1:150:4095 blocked for more than 454 seconds. r5:84cf6000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8471838c r4:84718000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8471838c r4:85160f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cf6000 r8:85160fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85160f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85160f80 r8:80287e08 r7:e077de60 r6:851cd000 r5:84cf6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0809fb0 to 0xe0809ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851d2100 INFO: task kworker/1:150:4095 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9d335000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8519478c r4:85194400 r7:ddde2d80 r6:83018200 r5:8519478c r4:851cd080 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 dd60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe060dfb0 to 0xe060dff8) Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:152 state:D stack:0 pid:4099 tgid:4099 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e4891d84 r8:00000002 r7:60000013 r6:e4891d8c r5:85056000 r4:85056000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85056000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4891e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d2800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85056000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff0b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85194b8c r4:85194800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85194b8c r4:851cd180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85056000 r8:851cd1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cd180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cd180 r8:80287e08 r7:e0869e60 r6:851cd200 r5:85056000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4891fb0 to 0xe4891ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851d2380 INFO: task kworker/1:152:4099 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9d335000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:e48fdd84 r8:00000002 r7:60000113 r6:e48fdd8c r5:84cf5400 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8520678c r4:85206400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84cf5400 r8:851c952c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851c9500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c9500 r8:80287e08 r7:eab55e60 r6:851cd280 r5:84cf5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48fdfb0 to 0xe48fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85187c80 INFO: task kworker/0:337:4100 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9d335000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 INFO: task kworker/1:153:4103 blocked for more than 454 seconds. r5:85240c00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85194f8c r4:85194c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85194f8c r4:851cd300 r4:851cd300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cd300 r8:80287e08 r7:e4891e60 r6:851cd380 r5:85240c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4885fb0 to 0xe4885ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851d2680 INFO: task kworker/1:153:4103 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9d335000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) INFO: task kworker/1:154:4105 blocked for more than 454 seconds. r4:85241800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0805e08 r9:83018205 r8:85241800 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 r5:8519538c r4:85195000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:851cd400 r8:80287e08 r7:e4885e60 r6:851cd480 r5:85241800 r4:851d2700 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 INFO: task kworker/1:155:4107 blocked for more than 454 seconds. [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 r5:8519578c r4:85195400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:851cd500 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:156:4110 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:156 state:D stack:0 pid:4110 tgid:4110 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e8921d84 r8:00000002 r7:60000113 r6:e8921d8c r5:85243c00 r4:85243c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85243c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8921e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d2d80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85243c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01f9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85195b8c r4:85195800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85195b8c r4:851cd600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85243c00 r8:851cd62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8921fb0 to 0xe8921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851d2ac0 INFO: task kworker/1:156:4110 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9d335000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:8506c000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85244800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 r5:85195f8c r4:85195c00 r7:ddde2d80 r6:83018200 r5:85195f8c r4:851cd700 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: 9d335000 eca69000 00000001 80239b98 7f23f000 00000001 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 INFO: task kworker/1:158:4113 blocked for more than 454 seconds. r4:85246000 r4:00000000 r4:00000000 r5:8519638c r4:85196000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:851cd800 Exception stack(0xe8945fb0 to 0xe8945ff8) Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:159:4115 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:159 state:D stack:0 pid:4115 tgid:4115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e8951d84 r8:00000002 r7:60000013 r6:e8951d8c r5:85243000 r4:85243000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85243000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8951e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85189780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85243000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e078b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85196f8c r4:85196c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85196f8c r4:851cd900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85243000 r8:851cd92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cd900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cd900 r8:80287e08 r7:e8945e60 r6:851cd980 r5:85243000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8951fb0 to 0xe8951ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85246c00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r5:85196b8c r4:85196800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:851cda00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cda00 r8:80287e08 r7:e8951e60 r6:851cda80 r5:85246c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8975fb0 to 0xe8975ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85189180 INFO: task kworker/1:160:4117 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9d335000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:338:4118 blocked for more than 454 seconds. r4:85240000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9bde08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8519678c r4:85196400 r7:dddced80 r6:83018000 r5:8519678c r4:851c9580 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:84d91880 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:161:4122 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:161 state:D stack:0 pid:4122 tgid:4122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e8915d84 r8:00000002 r7:60000013 r6:e8915d8c r5:85245400 r4:85245400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85245400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8915e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851898c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85245400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07a7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8519738c r4:85197000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8519738c r4:851cdb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85245400 r8:851cdbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cdb80 r10:00000000 r9:851cdb80 r8:80287e08 r7:e8951e60 r6:851cdc00 r5:85245400 r4:85189800 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:82ac21e4 r4:00000000 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:8506c000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85197f8c r4:851cdc80 Exception stack(0xea9ddfb0 to 0xea9ddff8) task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000013 r4:80239bb0 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r5:85058000 r4:8291a680 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab6de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85189a80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85058000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07c3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8519778c r4:85197400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8519778c r4:851cdd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85058000 r8:851cddac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cdd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cdd80 r8:80287e08 r7:ea9dde60 r6:851cde00 r5:85058000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab6dfb0 to 0xeab6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851899c0 INFO: task kworker/1:163:4126 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9d335000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:164:4127 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:164 state:D stack:0 pid:4127 tgid:4127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e8965d84 r8:00000002 r7:60000013 r6:e8965d8c r5:85058c00 r4:85058c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85058c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8965e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85189c00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85058c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07d5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85197b8c r4:85197800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85197b8c r4:851cde80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85058c00 r8:851cdeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cde80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cde80 r8:80287e08 r7:ea9dde60 r6:851cdf00 r5:85058c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8965fb0 to 0xe8965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85189b40 INFO: task kworker/1:164:4127 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:165:4130 blocked for more than 454 seconds. Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:8505a400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 r5:851a038c r4:851a0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a038c r4:851cdf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8505a400 r8:851cdfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cdf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cdf80 r8:80287e08 r7:ea9dde60 r6:8517b000 r5:8505a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab75fb0 to 0xeab75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85189c40 INFO: task kworker/1:165:4130 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9d335000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r4:e060ddc0 r5:00001000 r4:dfc25000 r4:84d91880 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:166 state:D stack:0 pid:4132 tgid:4132 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a0b8c r4:851a0800 r4:8517b080 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:82ac21e4 r4:00000000 r5:84fdf38c r4:84fdf000 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab7de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d2cc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8505bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e081d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a078c r4:851a0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a078c r4:8517b180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8505bc00 r8:8517b1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8517b180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517b180 r8:80287e08 r7:eab79e60 r6:8517b200 r5:8505bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab7dfb0 to 0xeab7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851d2f80 INFO: task kworker/1:167:4133 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9d335000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eab81d84 r8:00000002 r7:60000113 r6:eab81d8c r5:8505d400 r4:8505d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8505d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab81e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85184700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8505d400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e086b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a138c r4:851a1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a138c r4:8517b280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8505d400 r8:8517b2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8517b280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517b280 r8:80287e08 r7:eab79e60 r6:8517b300 r5:8505d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab81fb0 to 0xeab81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851840c0 INFO: task kworker/1:168:4136 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9d335000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:169:4138 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:169 state:D stack:0 pid:4138 tgid:4138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:851a0f8c r4:851a0c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeab85fb0 to 0xeab85ff8) task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9d335000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab89e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85187880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8505b000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa3b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85206b8c r4:85206800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85206b8c r4:851c9600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8505b000 r8:851c962c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851c9600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c9600 r8:80287e08 r7:eab55e60 r6:8517b480 r5:8505b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab89fb0 to 0xeab89ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:85188600 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r5:84fdf38c r4:84fdf000 r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:170:4142 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:170 state:D stack:0 pid:4142 tgid:4142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab95d84 r8:00000002 r7:60000113 r6:eab95d8c r5:8514e000 r4:8514e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8514e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:851a178c r4:851a1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeab95fb0 to 0xeab95ff8) Workqueue: events bpf_prog_free_deferred dd20: 9d335000 eca69000 00000001 80239b98 7f23f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:171:4143 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:171 state:D stack:0 pid:4143 tgid:4143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab99d84 r8:00000002 r7:60000113 r6:eab99d8c r5:8514ec00 r4:8514ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8514ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab99e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85184ac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8514ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a1f8c r4:851a1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8517b580 r8:80287e08 r7:eab95e60 r6:851c9700 r5:8514ec00 r4:85184580 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r5:8514d400 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:851a1b8c r4:8517b600 Exception stack(0xeaba1fb0 to 0xeaba1ff8) task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:173:4146 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:173 state:D stack:0 pid:4146 tgid:4146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaba5d84 r8:00000002 r7:60000013 r6:eaba5d8c r5:8514b000 r4:8514b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8514b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85184c00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8514b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48d6000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a238c r4:851a2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a238c r4:8517b680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8514b000 r8:8517b6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8517b680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517b680 r8:80287e08 r7:eab99e60 r6:851c9800 r5:8514b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba5fb0 to 0xeaba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851847c0 INFO: task kworker/1:173:4146 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9d335000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:174:4149 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:174 state:D stack:0 pid:4149 tgid:4149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:84c08c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb1e08 r5:00001000 r4:e8905000 r5:851a2b8c r4:851a2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8517b700 Exception stack(0xeabb1fb0 to 0xeabb1ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe060dd28 to 0xe060dd70) r4:82ac21e4 r4:00000000 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84c09800 r8:8517b7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:82ac21e4 r4:00000000 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:176:4152 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:176 state:D stack:0 pid:4152 tgid:4152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabbdd84 r8:00000002 r7:60000113 r6:eabbdd8c r5:84c0b000 r4:84c0b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c0b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabbde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85168f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84c0b000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a3f8c r4:851a3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a3f8c r4:8517b800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c0b000 r8:8517b82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8517b800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517b800 r8:80287e08 r7:eabb1e60 r6:851c9980 r5:84c0b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabbdfb0 to 0xeabbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r5:80000013 r4:80239bb0 r4:e060ddc0 r5:00001000 r4:dfc25000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:177 state:D stack:0 pid:4154 tgid:4154 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a2f8c r4:851a2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a2f8c r4:8517b880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c0a400 r8:8517b8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8517b880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517b880 r8:80287e08 r7:eabbde60 r6:851c9a00 r5:84c0a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc5fb0 to 0xeabc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85184c80 INFO: task kworker/1:177:4154 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9d335000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 r4:84d91880 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r5:84c0c800 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:851a338c r4:851a3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:179:4158 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:179 state:D stack:0 pid:4158 tgid:4158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabd5d84 r8:00000002 r7:60000113 r6:eabd5d8c r5:84c0bc00 r4:84c0bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c0bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851680c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84c0bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8961000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a378c r4:851a3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a378c r4:8517b980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c0bc00 r8:8517b9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8517b980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517b980 r8:80287e08 r7:eabbde60 r6:851c9b00 r5:84c0bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd5fb0 to 0xeabd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85168000 INFO: task kworker/1:179:4158 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9da43000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85206f8c r4:85206c00 r10:00000000 r9:851c9b80 r8:80287e08 r7:eab55e60 r6:851c9c00 r5:84c0e000 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-rc7-syzkaller #0 r4:84c0ec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab8de08 r5:00001000 r4:eaa79000 r5:851a3b8c r4:851a3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8517ba00 Exception stack(0xeab8dfb0 to 0xeab8dff8) Workqueue: events bpf_prog_free_deferred dd20: 9da43000 eca69000 00000001 80239b98 7f23f000 00000001 r4:e060ddc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eab71d84 r8:00000002 r7:60000013 r6:eab71d8c r5:84c0d400 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8521438c r4:851c9d00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:342:4168 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:342 state:D stack:0 pid:4168 tgid:4168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e075dd84 r8:00000002 r7:60000013 r6:e075dd8c r5:84c08000 r4:84c08000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c08000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e075de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85161380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c08000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 r5:8520778c r4:85207400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:851c9e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:343:4170 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:343 state:D stack:0 pid:4170 tgid:4170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea98dd84 r8:00000002 r7:60000013 r6:ea98dd8c r5:8514c800 r4:8514c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8514c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea98de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85161480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8514c800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85207b8c r4:85207800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:851c9f00 Exception stack(0xea98dfb0 to 0xea98dff8) Workqueue: events bpf_prog_free_deferred dd20: 9da43000 eca69000 00000001 80239b98 7f23f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85207f8c r4:85207c00 r4:8516c000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9da43000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:345:4174 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:345 state:D stack:0 pid:4174 tgid:4174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa61d84 r8:00000002 r7:60000113 r6:eaa61d8c r5:85258000 r4:85258000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85258000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa61e08 r5:00001000 r4:e0173000 r5:8521478c r4:85214400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8516c100 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: 9da43000 eca69000 00000001 80239b98 7f23f000 00000001 r4:e060ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 INFO: task kworker/0:346:4176 blocked for more than 454 seconds. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85258c00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 r5:85214b8c r4:85214800 r4:8516c200 Exception stack(0xeaa7dfb0 to 0xeaa7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85161800 INFO: task kworker/0:346:4176 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9da43000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:347:4178 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:347 state:D stack:0 pid:4178 tgid:4178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa89d84 r8:00000002 r7:60000113 r6:eaa89d8c r5:85259800 r4:85259800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85259800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85214f8c r4:85214c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8516c300 Exception stack(0xeaa89fb0 to 0xeaa89ff8) task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:348:4181 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:348 state:D stack:0 pid:4181 tgid:4181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa9dd84 r8:00000002 r7:60000113 r6:eaa9dd8c r5:8525a400 r4:8525a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8525a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8521538c r4:85215000 r10:61c88647 r9:8525a400 r8:8516c42c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 INFO: task kworker/0:349:4182 blocked for more than 454 seconds. r4:8525b000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa9e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8521578c r4:85215400 r4:8516c500 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r5:80000013 r4:80239bb0 r4:00000000 r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:350:4185 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:350 state:D stack:0 pid:4185 tgid:4185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaac9d84 r8:00000002 r7:60000113 r6:eaac9d8c r5:8525bc00 r4:8525bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8525bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85161ec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8525bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05f9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85215b8c r4:85215800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85215b8c r4:8516c600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8525bc00 r8:8516c62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8516c600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516c600 r8:80287e08 r7:eaaa9e60 r6:8516c680 r5:8525bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac9fb0 to 0xeaac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85161dc0 INFO: task kworker/0:350:4185 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85215f8c r4:85215c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85278c00 r8:8516c72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaae1fb0 to 0xeaae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85161dc0 INFO: task kworker/0:351:4186 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9da43000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eaaf9d84 r8:00000002 r7:60000013 r6:eaaf9d8c r5:85278000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8521638c r4:85216000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8516c780 Exception stack(0xeaaf9fb0 to 0xeaaf9ff8) r4:8517e000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r9:83018005 r8:85279800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 r5:8521678c r4:85216400 r10:61c88647 r9:85279800 r8:8516c82c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe060dd28 to 0xe060dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:354:4191 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:354 state:D stack:0 pid:4191 tgid:4191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaacdd84 r8:00000002 r7:60000113 r6:eaacdd8c r5:8525d400 r4:8525d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8525d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaacde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517e5c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8525d400 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9a1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85216b8c r4:85216800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85216b8c r4:8516c880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8525d400 r8:8516c8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8516c880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516c880 r8:80287e08 r7:eab05e60 r6:8516c900 r5:8525d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaacdfb0 to 0xeaacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8517e300 INFO: task kworker/0:354:4191 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9da43000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:355:4194 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:8525e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaede08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517e700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8525e000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9ab000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85216f8c r4:85216c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85216f8c r4:8516c980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8525e000 r8:8516c9ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:8516c980 r8:80287e08 r7:eaacde60 r6:8516ca00 r5:8525e000 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517e880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ea9c3000 r5:8521738c r4:85217000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8516ca80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe060dd28 to 0xe060dd70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:8521778c r4:85217400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9da43000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:358:4200 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85217f8c r4:85217c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8516cc80 r8:80287e08 r7:eab1de60 r6:8516cd00 r5:84ea0000 r4:8517e840 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:82ac21e4 r4:00000000 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eab35d84 r8:00000002 r7:60000113 r6:eab35d8c r5:84ea0c00 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85217b8c r4:85217800 r7:dddced80 r6:83018000 r5:85217b8c r4:8516cd80 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:360:4204 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:360 state:D stack:0 pid:4204 tgid:4204 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab51d84 r8:00000002 r7:60000113 r6:eab51d8c r5:84ea1800 r4:84ea1800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ea1800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab51e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8517ee80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ea1800 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa11000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8522038c r4:85220000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8522038c r4:8516ce80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ea1800 r8:8516ceac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8516ce80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516ce80 r8:80287e08 r7:eab29e60 r6:8516cf00 r5:84ea1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab51fb0 to 0xeab51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8517eb80 INFO: task kworker/0:360:4204 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9da43000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 r5:8522078c r4:85220400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8516cf80 Exception stack(0xeaad5fb0 to 0xeaad5ff8) r4:8517ee00 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:82ac21e4 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:8506c000 task:kworker/0:362 state:D stack:0 pid:4207 tgid:4207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabddd84 r8:00000002 r7:60000013 r6:eabddd8c r5:84ea3c00 r4:84ea3c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ea3c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabdde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d51c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ea3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaad1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85220b8c r4:85220800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85220b8c r4:851dc080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ea3c00 r8:851dc0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851dc080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dc080 r8:80287e08 r7:eaad5e60 r6:851dc100 r5:84ea3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabddfb0 to 0xeabddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8517ee00 INFO: task kworker/0:362:4207 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9da43000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:8506c000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:eabe9d84 r8:00000002 r7:60000113 r6:eabe9d8c r5:84ea5400 r4:84ea5400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ea5400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d9900 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ea5400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc61000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a878c r4:851a8400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a878c r4:8517bc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ea5400 r8:8517bc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8517bc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517bc00 r8:80287e08 r7:eabbde60 r6:851dc180 r5:84ea5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabe9fb0 to 0xeabe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85168180 INFO: task kworker/1:181:4210 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9da43000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r5:84fdf38c r4:84fdf000 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe060dfb0 to 0xe060dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291a684 r9:eab5dd84 r8:00000002 r7:60000113 r6:eab5dd8c r5:8527bc00 r4:8527bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8527bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab5de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d9800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8527bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbe3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a838c r4:851a8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a838c r4:8517bc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8527bc00 r8:8517bcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8517bc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517bc80 r8:80287e08 r7:eabe9e60 r6:8517bd00 r5:8527bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab5dfb0 to 0xeab5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85168180 INFO: task kworker/1:182:4212 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 Exception stack(0xe060dd28 to 0xe060dd70) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8522138c r4:85221000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9da43000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:364:4216 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:364 state:D stack:0 pid:4216 tgid:4216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabedd84 r8:00000002 r7:60000013 r6:eabedd8c r5:8527d400 r4:8527d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8527d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabede08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d5340 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8527d400 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab01000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85220f8c r4:85220c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85220f8c r4:851dc280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8527d400 r8:851dc2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851dc280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dc280 r8:80287e08 r7:eabe1e60 r6:8517be00 r5:8527d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabedfb0 to 0xeabedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851d5100 INFO: task kworker/0:364:4216 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe060dfb0 to 0xe060dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabf1d84 r8:00000002 r7:60000013 r6:eabf1d8c r5:8527e000 r4:8527e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8527e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d55c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8527e000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab4d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8522178c r4:85221400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8522178c r4:851dc300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8527e000 r8:851dc32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851dc300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe060dd28 to 0xe060dd70) dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:366:4220 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:366 state:D stack:0 pid:4220 tgid:4220 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84ea2400 r4:8291a680 r4:00000000 r9:83018005 r8:84ea2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 r5:8522238c r4:85222000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84ea2400 r8:851dc3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851d5440 Call trace: dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85221b8c r4:85221800 r10:61c88647 r9:84ea6000 r8:851dc4ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:368:4224 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:368 state:D stack:0 pid:4224 tgid:4224 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac0dd84 r8:00000002 r7:60000013 r6:eac0dd8c r5:84ea6c00 r4:84ea6c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ea6c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac0de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d5840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ea6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac03000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85221f8c r4:85221c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85221f8c r4:851dc580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ea6c00 r8:851dc5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851dc580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dc580 r8:80287e08 r7:eabe5e60 r6:851dc600 r5:84ea6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac0dfb0 to 0xeac0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851d5900 INFO: task kworker/0:368:4224 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:369:4227 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:369 state:D stack:0 pid:4227 tgid:4227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac19d84 r8:00000002 r7:60000113 r6:eac19d8c r5:84ea4800 r4:84ea4800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ea4800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac19e08 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8522278c r4:85222400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8522278c r4:851dc680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ea4800 r8:851dc6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851dc680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dc680 r8:80287e08 r7:eabe5e60 r6:851dc700 r5:84ea4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac19fb0 to 0xeac19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851d57c0 INFO: task kworker/0:369:4227 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9da43000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84d91880 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eac01d84 r8:00000002 r7:60000013 r6:eac01d8c r5:85260000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85222f8c r4:85222c00 r7:dddced80 r6:83018000 r5:85222f8c r4:851dc780 r10:00000000 r9:851dc780 r8:80287e08 r7:eac19e60 r6:851dc800 r5:85260000 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe060dfb0 to 0xe060dff8) INFO: task kworker/0:371:4229 blocked for more than 454 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac31d84 r8:00000002 r7:60000113 r6:eac31d8c r5:85261800 r4:85261800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85261800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac31e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d5cc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85261800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac27000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85222b8c r4:85222800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85222b8c r4:851dc880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85261800 r8:851dc8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851dc880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dc880 r8:80287e08 r7:eac01e60 r6:851dc900 r5:85261800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac31fb0 to 0xeac31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851d5ac0 INFO: task kworker/0:371:4229 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9da43000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:372:4231 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:372 state:D stack:0 pid:4231 tgid:4231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab9dd84 r8:00000002 r7:60000113 r6:eab9dd8c r5:85262400 r4:85262400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85262400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab9de08 r4:00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8522338c r4:85223000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8522338c r4:851dc980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85262400 r8:851dc9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851dc980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dc980 r8:80287e08 r7:eac01e60 r6:851dca00 r5:85262400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab9dfb0 to 0xeab9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851d5ac0 INFO: task kworker/0:372:4231 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9da43000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe060dfb0 to 0xe060dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:183 state:D stack:0 pid:4236 tgid:4236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac41d84 r8:00000002 r7:60000113 r6:eac41d8c r5:85260c00 r4:85260c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85260c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac41e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d9a00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85260c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcbb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a8b8c r4:851a8800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a8b8c r4:8517bf00 r10:61c88647 r9:85260c00 r8:8517bf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe060dd28 to 0xe060dd70) dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:184 state:D stack:0 pid:4237 tgid:4237 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d9b40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85264800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd37000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851a8f8c r4:851a8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a8f8c r4:8517bf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85264800 r8:8517bfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8517bf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8517bf80 r8:80287e08 r7:eac41e60 r6:851dcb00 r5:85264800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe060dd28 to 0xe060dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85265400 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:851a9b8c r4:851a9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a9b8c r4:8333f500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85265400 r8:8333f52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8333f500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8333f500 r8:80287e08 r7:eac45e60 r6:851dcb80 r5:85265400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac4dfb0 to 0xeac4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851d9780 INFO: task kworker/1:185:4239 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9da43000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85263c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac51e08 r4:00000000 r5:85223b8c r4:85223800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85223b8c r4:832b0100 r10:61c88647 r9:85263c00 r8:832b012c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r4:e060ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eac49d84 r8:00000002 r7:60000113 r6:eac49d8c r5:85263000 r4:00000000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85263000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfff5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8522378c r4:85223400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8522378c r4:851dcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85263000 r8:851dccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851dcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dcc80 r8:80287e08 r7:eab9de60 r6:851dcd00 r5:85263000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac49fb0 to 0xeac49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851dd480 INFO: task kworker/0:373:4243 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9da43000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r4:8506c000 task:kworker/0:374 state:D stack:0 pid:4245 tgid:4245 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ddb00 r5:85223f8c r4:85223c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85266c00 r8:851dcdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851dcd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dcd80 r8:80287e08 r7:eac49e60 r6:851dce00 r5:85266c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac25fb0 to 0xeac25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851dd6c0 INFO: task kworker/0:374:4245 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9da43000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r5:85270000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d9e80 r5:851a938c r4:851a9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851a938c r4:851e3000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85270000 r8:851e302c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851e3000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e3000 r8:80287e08 r7:eac4de60 r6:851dce80 r5:85270000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac55fb0 to 0xeac55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851d9b80 INFO: task kworker/1:187:4247 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9da43000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:375:4249 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:375 state:D stack:0 pid:4249 tgid:4249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac59d84 r8:00000002 r7:60000013 r6:eac59d8c r5:85270c00 r4:85270c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85270c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac59e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851dd800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85270c00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06ad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8522c78c r4:8522c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8522c78c r4:851dcf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85270c00 r8:851dcf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851dcf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dcf00 r8:80287e08 r7:eac25e60 r6:851dcf80 r5:85270c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac59fb0 to 0xeac59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851dd980 INFO: task kworker/0:375:4249 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9da43000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eac5dd84 r8:00000002 r7:60000113 r6:eac5dd8c r5:85271800 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8522c38c r4:8522c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85271800 r8:851da02c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe060dd28 to 0xe060dd70) r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:377:4254 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:377 state:D stack:0 pid:4254 tgid:4254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaba9d84 r8:00000002 r7:60000113 r6:eaba9d8c r5:85272400 r4:85272400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85272400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842b9180 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85272400 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0755000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8522cb8c r4:8522c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8522cb8c r4:851da100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85272400 r8:851da12c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851ddf00 INFO: task kworker/0:377:4254 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9da43000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 r4:e060ddc0 r5:00001000 r4:dfc25000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac65e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:851a9f8c r4:851a9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:851e3080 r8:80287e08 r7:eac4de60 r6:851da200 r5:85273000 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:8506c000 Workqueue: events bpf_prog_free_deferred r5:85273c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac61e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d5280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85273c00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e078d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8522cf8c r4:8522cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8522cf8c r4:851da280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85273c00 r8:851da2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851da280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851da280 r8:80287e08 r7:eaba9e60 r6:851da300 r5:85273c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac61fb0 to 0xeac61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851dda00 INFO: task kworker/0:378:4257 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9da43000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 r5:00001000 r4:dfc25000 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:eac69d84 r8:00000002 r7:60000113 r6:eac69d8c r5:85274800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac69e08 r5:00001000 r4:e07b7000 r5:8522d38c r4:8522d000 r7:dddced80 r6:83018000 r5:8522d38c r4:851da380 r4:00000001 r4:851dd8c0 Call trace: dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r4:e060ddc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85275400 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e7300 r5:8522db8c r4:8522d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85275400 r8:851da4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851da480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851da480 r8:80287e08 r7:eac69e60 r6:851da500 r5:85275400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac6dfb0 to 0xeac6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851d5f40 INFO: task kworker/0:380:4261 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9da43000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:381:4263 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:381 state:D stack:0 pid:4263 tgid:4263 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac71d84 r8:00000002 r7:60000013 r6:eac71d8c r5:85276000 r4:85276000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85276000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac71e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e71c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85276000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07d3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8522d78c r4:8522d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8522d78c r4:851da580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85276000 r8:851da5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851da580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8522df8c r4:8522dc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9da43000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:383:4267 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:383 state:D stack:0 pid:4267 tgid:4267 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac79d84 r8:00000002 r7:60000113 r6:eac79d8c r5:84eb8000 r4:84eb8000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84eb8000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac79e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8522e38c r4:8522e000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe060dd28 to 0xe060dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r5:84fdf38c r4:84fdf000 r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) INFO: task kworker/0:384:4270 blocked for more than 455 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac7dd84 r8:00000002 r7:60000113 r6:eac7dd8c r5:84eb8c00 r4:84eb8c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84eb8c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac7de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e7780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84eb8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0853000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8522e78c r4:8522e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8522e78c r4:851da880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84eb8c00 r8:851da8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851da880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851da880 r8:80287e08 r7:eac79e60 r6:851da900 r5:84eb8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac7dfb0 to 0xeac7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:385:4271 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e7940 r5:8522eb8c r4:8522e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84eb9800 r8:851da9ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9da43000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84eba400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac85e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8522ef8c r4:8522ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84eba400 r8:851daaac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84ebb000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac89e08 r9:83018005 r8:84ebb000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 r5:8522f38c r4:8522f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:851dab80 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851e7900 INFO: task kworker/0:387:4275 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9da43000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:388:4278 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:388 state:D stack:0 pid:4278 tgid:4278 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac8dd84 r8:00000002 r7:60000013 r6:eac8dd8c r5:84ebbc00 r4:84ebbc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ebbc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r9:83018005 r8:84ebbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r5:8522f78c r4:8522f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84ebbc00 r8:851dacac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8522ff8c r4:8522fc00 r10:61c88647 r9:84ebc800 r8:851dadac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:390:4281 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:390 state:D stack:0 pid:4281 tgid:4281 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac91d84 r8:00000002 r7:60000013 r6:eac91d8c r5:84ebd400 r4:84ebd400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ebd400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac91e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e7f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ebd400 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8901000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8522fb8c r4:8522f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8522fb8c r4:851dae80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ebd400 r8:851daeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851dae80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dae80 r8:80287e08 r7:eac95e60 r6:851daf00 r5:84ebd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac91fb0 to 0xeac91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851d9380 INFO: task kworker/0:390:4281 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9da43000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:84ebe000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 r5:8523878c r4:85238400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:851daf80 r10:00000000 r9:851daf80 r8:80287e08 r7:eac95e60 r6:851fc000 r5:84ebe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac99fb0 to 0xeac99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851fe080 INFO: task kworker/0:391:4284 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9da43000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:392:4285 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:392 state:D stack:0 pid:4285 tgid:4285 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac9dd84 r8:00000002 r7:60000113 r6:eac9dd8c r5:84ebec00 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8523838c r4:85238000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84ebec00 r8:851fc0ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe060dd28 to 0xe060dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:393:4288 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:393 state:D stack:0 pid:4288 tgid:4288 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaca1d84 r8:00000002 r7:60000113 r6:eaca1d8c r5:852c0000 r4:852c0000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852c0000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fe4c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:85238b8c r4:85238800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85238b8c r4:851fc180 r10:61c88647 r9:852c0000 r8:851fc1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851fe200 Call trace: Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9dfdb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:394:4289 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:394 state:D stack:0 pid:4289 tgid:4289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaca5d84 r8:00000002 r7:60000113 r6:eaca5d8c r5:852c0c00 r5:852c0c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fe680 r5:85238f8c r4:85238c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:852c0c00 r8:851fc2ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:dfc25000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:852c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 r5:8523938c r4:85239000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:851fc380 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:396:4293 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:396 state:D stack:0 pid:4293 tgid:4293 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacadd84 r8:00000002 r7:60000113 r6:eacadd8c r5:852c2400 r4:852c2400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852c2400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacade08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851feac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852c2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacb5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8523978c r4:85239400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8523978c r4:851fc480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852c2400 r8:851fc4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851fc480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fc480 r8:80287e08 r7:eaca9e60 r6:851fc500 r5:852c2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacadfb0 to 0xeacadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851fe600 INFO: task kworker/0:396:4293 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9dfdb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:852c3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 r5:85239f8c r4:85239c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe060dd28 to 0xe060dd70) dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:398:4297 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:398 state:D stack:0 pid:4297 tgid:4297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacb9d84 r8:00000002 r7:60000013 r6:eacb9d8c r5:852c3c00 r4:852c3c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852c3c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851feb80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85239b8c r4:85239800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85239b8c r4:851fc680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852c3c00 r8:851fc6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851fc680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fc680 r8:80287e08 r7:eacbde60 r6:851fc700 r5:852c3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacb9fb0 to 0xeacb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:398:4297 is blocked on a mutex likely owned by task kworker/0:201:3787. dd60: 80230ad0 80239bb0 80000013 ffffffff r4:e060ddc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:8506c000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:851fc780 r8:80287e08 r7:eacbde60 r6:851fc800 r5:852c4800 INFO: task kworker/0:399:4300 is blocked on a mutex likely owned by task kworker/0:201:3787. Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9dfdb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:400:4301 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:400 state:D stack:0 pid:4301 tgid:4301 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacc9d84 r8:00000002 r7:60000113 r6:eacc9d8c r5:852c5400 r4:852c5400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852c5400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fefc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eace9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8523a78c r4:8523a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8523a78c r4:851fc880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852c5400 r8:851fc8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851fc880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fc880 r8:80287e08 r7:eace1e60 r6:851fc900 r5:852c5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacc9fb0 to 0xeacc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851feb40 INFO: task kworker/0:400:4301 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9dfdb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8506c000 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:eacedd84 r8:00000002 r7:60000013 r6:eacedd8c r5:852c6000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacede08 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8523ab8c r4:8523a800 r7:dddced80 r6:83018000 r5:8523ab8c r4:851fc980 r10:61c88647 r9:852c6000 r8:851fc9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe060dd28 to 0xe060dd70) dd60: 80230ad0 80239bb0 80000013 ffffffff r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:402:4305 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:402 state:D stack:0 pid:4305 tgid:4305 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacf9d84 r8:00000002 r7:60000113 r6:eacf9d8c r5:852c6c00 r4:852c6c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852c6c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f5500 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead0d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8523b38c r4:8523b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8523b38c r4:851fca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852c6c00 r8:851fcaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851fca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fca80 r8:80287e08 r7:eacede60 r6:851fcb00 r5:852c6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacf9fb0 to 0xeacf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852f5240 INFO: task kworker/0:402:4305 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9dfdb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead05d84 r8:00000002 r7:60000013 r6:ead05d8c r5:84d98000 r4:84d98000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d98000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead05e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f5300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d98000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead01000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8523af8c r4:8523ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8523af8c r4:851fcb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d98000 r8:851fcbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851fcb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fcb80 r8:80287e08 r7:eacf9e60 r6:851fcc00 r5:84d98000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe060dd28 to 0xe060dd70) dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:404:4309 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:404 state:D stack:0 pid:4309 tgid:4309 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead11d84 r8:00000002 r7:60000113 r6:ead11d8c r5:84d98c00 r4:84d98c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d98c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead11e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f5680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d98c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9e7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8523b78c r4:8523b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8523b78c r4:851fcc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d98c00 r8:851fccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851fcc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fcc80 r8:80287e08 r7:eacf9e60 r6:851fcd00 r5:84d98c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead11fb0 to 0xead11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852f5380 INFO: task kworker/0:404:4309 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd20: 9dfdb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8523bb8c r4:8523b800 r10:61c88647 r9:84d99800 r8:851fcdac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe060dd28 to 0xe060dd70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f5b40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d9a400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd69000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532c38c r4:8532c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8532c38c r4:851fce80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d9a400 r8:851fceac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851fce80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fce80 r8:80287e08 r7:eabfde60 r6:851fcf00 r5:84d9a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac15fb0 to 0xeac15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852f5480 INFO: task kworker/0:406:4312 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9dfdb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8506c000 task:kworker/0:407 state:D stack:0 pid:4315 tgid:4315 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfb0d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84d9b000 r8:851fcfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851fcf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fcf80 r8:80287e08 r7:eac15e60 r6:852ff000 r5:84d9b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac09fb0 to 0xeac09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852f58c0 INFO: task kworker/0:407:4315 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9dfdb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 dfa0: 00000000 00000000 00000000 00000000 r4:8506c000 task:kworker/0:408 state:D stack:0 pid:4318 tgid:4318 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84d9bc00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532c78c r4:8532c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:852f5940 Call trace: Exception stack(0xe060dd28 to 0xe060dd70) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:409:4319 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:409 state:D stack:0 pid:4319 tgid:4319 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead21d84 r8:00000002 r7:60000013 r6:ead21d8c r5:84d9c800 r4:84d9c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d9c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead21e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f5e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532cb8c r4:8532c800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84d9d400 r8:852ff2ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:852ff280 r8:80287e08 r7:ead21e60 r6:852ff300 r5:84d9d400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9dfdb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:411:4323 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:411 state:D stack:0 pid:4323 tgid:4323 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead25d84 r8:00000002 r7:60000113 r6:ead25d8c r5:84d9e000 r4:84d9e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d9e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead25e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85305100 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe060dd28 to 0xe060dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532d78c r4:8532d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8532d78c r4:852ff380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8527a400 r8:852ff3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852ff380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ff380 r8:80287e08 r7:ead25e60 r6:851e3100 r5:8527a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead31fb0 to 0xead31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853051c0 INFO: task kworker/0:412:4325 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9dfdb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8532db8c r4:852ff500 r4:00000001 r4:85305180 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfc25000 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:414:4329 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:414 state:D stack:0 pid:4329 tgid:4329 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead41d84 r8:00000002 r7:60000113 r6:ead41d8c r5:8527c800 r4:8527c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8527c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead41e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851efe00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8527c800 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532fb8c r4:8532f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8532fb8c r4:852ff580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8527c800 r8:852ff5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852ff580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ff580 r8:80287e08 r7:ead39e60 r6:851e3200 r5:8527c800 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8506c000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ead45d84 r8:00000002 r7:60000113 r6:ead45d8c r5:83ad4800 r4:83ad4800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83ad4800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead45e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85305480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83ad4800 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05f1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532df8c r4:8532dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8532df8c r4:852ff600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83ad4800 r8:852ff62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852ff600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ff600 r8:80287e08 r7:ead41e60 r6:851e3280 r5:83ad4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead45fb0 to 0xead45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853052c0 INFO: task kworker/0:415:4330 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: 9dfdb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r5:84fdf38c r4:84fdf000 Exception stack(0xe060dfb0 to 0xe060dff8) Workqueue: events bpf_prog_free_deferred [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8532e38c r4:8532e000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:417:4334 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:417 state:D stack:0 pid:4334 tgid:4334 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead55d84 r8:00000002 r7:60000013 r6:ead55d8c r5:8505e000 r4:8505e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8505e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead55e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853056c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8505e000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0759000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532e78c r4:8532e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8532e78c r4:852ff700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8505e000 r8:852ff72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852ff700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ff700 r8:80287e08 r7:ead41e60 r6:851e3380 r5:8505e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead55fb0 to 0xead55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85305540 INFO: task kworker/0:417:4334 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 Exception stack(0xe060dd28 to 0xe060dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe060dfb0 to 0xe060dff8) r4:8506c000 Workqueue: events bpf_prog_free_deferred r5:85268c00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532eb8c r4:8532e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:852ff780 Exception stack(0xead5dfb0 to 0xead5dff8) task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:419:4338 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:419 state:D stack:0 pid:4338 tgid:4338 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead65d84 r8:00000002 r7:60000013 r6:ead65d8c r5:85268000 r4:85268000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85268000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead65e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85305ac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85268000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9b3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532ef8c r4:8532ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8532ef8c r4:852ff800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85268000 r8:852ff82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852ff800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ff800 r8:80287e08 r7:ead41e60 r6:851e3480 r5:85268000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead65fb0 to 0xead65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85305a00 INFO: task kworker/0:419:4338 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd20: a14e9000 eca69000 00000001 80239b98 7f23f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r5:8526a400 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85305ec0 r5:8532f38c r4:8532f000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:80000013 r4:80239bb0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xe060dfb0 to 0xe060dff8) INFO: task kworker/1:189:4344 blocked for more than 455 seconds. [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85314d00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8526b000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa1f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851aa38c r4:851aa000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851aa38c r4:851e3580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8526b000 r8:851e35ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851e3580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e3580 r8:80287e08 r7:eac65e60 r6:851e3600 r5:8526b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead2dfb0 to 0xead2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853149c0 INFO: task kworker/1:189:4344 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: a16c4000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:191:4347 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:191 state:D stack:0 pid:4347 tgid:4347 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead61d84 r8:00000002 r7:60000113 r6:ead61d8c r5:8526c800 r4:8526c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8526c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead61e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85376e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8526c800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaccf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851ab38c r4:851ab000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851ab38c r4:851e3780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8526c800 r8:851e37ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851e3780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e3780 r8:80287e08 r7:ead69e60 r6:851e3800 r5:8526c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead61fb0 to 0xead61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85314b80 INFO: task kworker/1:191:4347 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: a2293000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:84fdf38c r4:84fdf000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8506c000 task:kworker/0:421 state:D stack:0 pid:4351 tgid:4351 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead6de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8526d400 r8:852ff92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe060dd28 to 0xe060dd70) r5:80000013 r4:80239bb0 r4:e060ddc0 r5:00001000 r4:dfc25000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8506c000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851aaf8c r4:851aac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851aaf8c r4:851e3900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8526e000 r8:851e392c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851e3900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e3900 r8:80287e08 r7:ead61e60 r6:851e3980 r5:8526e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead75fb0 to 0xead75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85314e40 INFO: task kworker/1:192:4352 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: a23f1000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:422:4354 blocked for more than 455 seconds. task:kworker/0:422 state:D stack:0 pid:4354 tgid:4354 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xead79fb0 to 0xead79ff8) task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 INFO: task kworker/0:423:4355 blocked for more than 455 seconds. r5:85269800 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85269800 r8:852ffa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 Exception stack(0xead7dfb0 to 0xead7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85305a80 INFO: task kworker/0:423:4355 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: a2944000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:424:4358 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:424 state:D stack:0 pid:4358 tgid:4358 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead81d84 r8:00000002 r7:60000113 r6:ead81d8c r5:8527ec00 r4:8527ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8527ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533038c r4:85330000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead85d84 r8:00000002 r7:60000113 r6:ead85d8c r5:85280000 r4:85280000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85280000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead85e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853133c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85280000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac1d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533078c r4:85330400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533078c r4:852ffb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85280000 r8:852ffb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852ffb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ffb00 r8:80287e08 r7:ead79e60 r6:851e3b80 r5:85280000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 r5:84fdf38c r4:84fdf000 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eada5d84 r8:00000002 r7:60000113 r6:eada5d8c r5:85282400 r4:85282400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85282400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853135c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85282400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead95000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85330f8c r4:85330c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85330f8c r4:852ffb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85282400 r8:852ffbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852ffb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ffb80 r8:80287e08 r7:ead79e60 r6:851e3c00 r5:85282400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeada5fb0 to 0xeada5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85313300 INFO: task kworker/0:426:4362 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: a2f22000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 Exception stack(0xe060dfb0 to 0xe060dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8506c000 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85313700 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533138c r4:85331000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533138c r4:852ffc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:852ffc00 r8:80287e08 r7:eada5e60 r6:851e3c80 r5:85283000 r4:85313440 Workqueue: events bpf_prog_free_deferred Exception stack(0xe060dd28 to 0xe060dd70) dd20: a3325000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:428:4365 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:428 state:D stack:0 pid:4365 tgid:4365 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadb1d84 r8:00000002 r7:60000113 r6:eadb1d8c r5:85283c00 r4:85283c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85283c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85313ac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85283c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadd5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85331f8c r4:85331c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85331f8c r4:852ffc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85283c00 r8:852ffcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852ffc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ffc80 r8:80287e08 r7:eadade60 r6:851e3d00 r5:85283c00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) r4:8506c000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eadb9000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533178c r4:85331400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533178c r4:852ffd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85280c00 r8:852ffd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852ffd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ffd00 r8:80287e08 r7:eadb1e60 r6:851e3d80 r5:85280c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadc9fb0 to 0xeadc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85313580 INFO: task kworker/0:429:4367 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: a3735000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:430:4370 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:430 state:D stack:0 pid:4370 tgid:4370 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead71d84 r8:00000002 r7:60000013 r6:ead71d8c r5:84c49800 r4:84c49800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85313980 r5:00001000 r4:eadc5000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85331b8c r4:85331800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84c49800 r8:852ffdac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:852ffd80 r8:80287e08 r7:eadb1e60 r6:852ffe00 r5:84c49800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:431:4372 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:431 state:D stack:0 pid:4372 tgid:4372 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadcdd84 r8:00000002 r7:60000013 r6:eadcdd8c r5:84c48000 r4:84c48000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c48000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadcde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85313f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c48000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85332b8c r4:85332800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85332b8c r4:852ffe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c48000 r8:852ffeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852ffe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ffe80 r8:80287e08 r7:eadb1e60 r6:852fff00 r5:84c48000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadcdfb0 to 0xeadcdff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe060dd28 to 0xe060dd70) r4:82ac21e4 r4:e060ddc0 r4:00000000 r5:00001000 r4:dfc25000 r5:84fdf38c r4:84fdf000 r4:84d91880 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r4:84c4a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead8de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85313d00 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533238c r4:85332000 r7:dddced80 r6:83018000 r5:8533238c r4:852fff80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c4a400 r8:852fffac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852fff80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852fff80 r8:80287e08 r7:eadcde60 r6:85315000 r5:84c4a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead8dfb0 to 0xead8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85313b00 INFO: task kworker/0:432:4373 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: a4378000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8506c000 task:kworker/0:433 state:D stack:0 pid:4376 tgid:4376 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84c4b000 r4:8291a680 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533278c r4:85332400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe060dd28 to 0xe060dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:434:4379 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:434 state:D stack:0 pid:4379 tgid:4379 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadfdd84 r8:00000002 r7:60000013 r6:eadfdd8c r5:84c4bc00 r4:84c4bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c4bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadfde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842b92c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c4bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9f3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533338c r4:85333000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533338c r4:85315180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c4bc00 r8:853151ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85315180 r10:00000000 r9:85315180 r8:80287e08 r7:eadcde60 r6:85315200 r5:84c4bc00 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:84fdf38c r4:84fdf000 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 r4:8506c000 task:kworker/0:435 state:D stack:0 pid:4380 tgid:4380 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84c4c800 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe060dd28 to 0xe060dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:436:4382 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:436 state:D stack:0 pid:4382 tgid:4382 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac35d84 r8:00000002 r7:60000013 r6:eac35d8c r5:84c4d400 r4:84c4d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c4d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac35e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85367040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc03000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533378c r4:85333400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533378c r4:85315380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c4d400 r8:853153ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85315380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85315380 r8:80287e08 r7:eadfde60 r6:85315400 r5:84c4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac35fb0 to 0xeac35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85367080 INFO: task kworker/0:436:4382 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 dd20: a448b000 eca69000 00000001 80239b98 7f23f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85333f8c r4:85315480 r10:61c88647 r9:84c4ec00 r8:853154ac r7:82804d40 r6:dddced80 r5:dddceda0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85315480 r8:80287e08 r7:eac35e60 r6:85315500 r5:84c4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac39fb0 to 0xeac39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85367180 INFO: task kworker/0:437:4384 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: a4c29000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:438:4386 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:438 state:D stack:0 pid:4386 tgid:4386 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae15d84 r8:00000002 r7:60000113 r6:eae15d8c r5:84d9ec00 r4:84d9ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d9ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae15e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85367500 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d9ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85333b8c r4:85333800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85367380 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:84fdf38c r4:84fdf000 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853678c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c4e000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff3f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533c38c r4:8533c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533c38c r4:85315680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c4e000 r8:853156ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85315680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85315680 r8:80287e08 r7:eac39e60 r6:85315700 r5:84c4e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae19fb0 to 0xeae19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853674c0 INFO: task kworker/0:439:4389 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: a4d66000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 Exception stack(0xe060dfb0 to 0xe060dff8) INFO: task kworker/0:440:4391 blocked for more than 456 seconds. r5:85284800 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85367740 Workqueue: events bpf_prog_free_deferred r4:00000000 dd20: a4d66000 eca69000 00000001 80239b98 7f23f000 00000001 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:441:4393 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:441 state:D stack:0 pid:4393 tgid:4393 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae25d84 r8:00000002 r7:60000113 r6:eae25d8c r5:85286000 r4:85286000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85286000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae25e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85367b00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85286000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533cb8c r4:8533c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533cb8c r4:85315800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85286000 r8:8531582c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85315800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85315800 r8:80287e08 r7:eae1de60 r6:851e3e80 r5:85286000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae25fb0 to 0xeae25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85367880 INFO: task kworker/0:441:4393 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: a5369000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 r5:84fdf38c r4:84fdf000 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 Exception stack(0xe060dfb0 to 0xe060dff8) r4:8506c000 Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eae2dd84 r8:00000002 r7:60000013 r6:eae2dd8c r5:85285400 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85367f40 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533d78c r4:8533d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533d78c r4:85315880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85285400 r8:853158ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85315880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85315880 r8:80287e08 r7:eae25e60 r6:851e3f00 r5:85285400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae2dfb0 to 0xeae2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85367900 INFO: task kworker/0:442:4395 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: a5369000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:443:4396 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:443 state:D stack:0 pid:4396 tgid:4396 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacd5d84 r8:00000002 r7:60000113 r6:eacd5d8c r5:84c48c00 r4:84c48c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c48c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85367900 r5:00001000 r4:e05a5000 r5:8533cf8c r4:8533cc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd60: 80230ad0 80239bb0 80000013 ffffffff r4:e060ddc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84d30000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae31e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85367e00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d30000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06ab000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533d38c r4:8533d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533d38c r4:85315a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d30000 r8:85315a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85315a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85315a00 r8:80287e08 r7:eae2de60 r6:85315a80 r5:84d30000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae31fb0 to 0xeae31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85367a80 INFO: task kworker/0:444:4399 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: a5bcc000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 INFO: task kworker/0:445:4400 blocked for more than 456 seconds. r4:84d30c00 r5:84d30c00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe060dd28 to 0xe060dd70) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:446:4402 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:446 state:D stack:0 pid:4402 tgid:4402 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae35d84 r8:00000002 r7:60000113 r6:eae35d8c r5:84d31800 r4:84d31800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d31800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae35e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:e07f9000 r5:8533df8c r4:8533dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84d31800 r8:85315c2c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85288000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 r5:84058f8c r4:84058c00 r10:61c88647 r9:85288000 r8:851e3e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:447:4407 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:447 state:D stack:0 pid:4407 tgid:4407 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae41d84 r8:00000002 r7:60000113 r6:eae41d8c r5:85289800 r4:85289800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85289800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae41e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536e4c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85289800 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0841000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533e78c r4:8533e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533e78c r4:85315d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85289800 r8:85315d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85315d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85315d00 r8:80287e08 r7:eae35e60 r6:85377080 r5:85289800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae41fb0 to 0xeae41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8536e000 INFO: task kworker/0:447:4407 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: a65e5000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:448:4409 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:448 state:D stack:0 pid:4409 tgid:4409 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae45d84 r8:00000002 r7:60000013 r6:eae45d8c r5:8528a400 r4:8528a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8528a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae45e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536e340 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8528a400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 r5:8533e38c r4:8533e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533e38c r4:85315d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8528a400 r8:85315dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85315d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85315d80 r8:80287e08 r7:eae41e60 r6:85377100 r5:8528a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae45fb0 to 0xeae45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8536e1c0 INFO: task kworker/0:448:4409 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 r4:00000001 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:8528b000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae49e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8533eb8c r4:8533e800 r10:61c88647 r9:8528b000 r8:85315e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85315e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85315e00 r8:80287e08 r7:eae41e60 r6:85377180 r5:8528b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae49fb0 to 0xeae49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8536e1c0 INFO: task kworker/0:449:4410 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: a684e000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536e6c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8528bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48a7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533ef8c r4:8533ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533ef8c r4:85315e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8528bc00 r8:85315eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85315e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85315e80 r8:80287e08 r7:eae49e60 r6:85377200 r5:8528bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae55fb0 to 0xeae55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8536e3c0 INFO: task kworker/0:450:4413 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r4:e060ddc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8528c800 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8534438c r4:85344000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85315f00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8533f38c r4:8533f000 r10:61c88647 r9:8528ec00 r8:85315fac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: a6fd2000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:453:4418 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:453 state:D stack:0 pid:4418 tgid:4418 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae69d84 r8:00000002 r7:60000013 r6:eae69d8c r5:8528d400 r4:8528d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8528d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae69e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536e980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8528d400 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 r5:8533f78c r4:8533f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533f78c r4:8536f000 r10:00000000 r9:8536f000 r8:80287e08 r7:eae5de60 r6:85377380 r5:8528d400 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85281800 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8533fb8c r4:8533f800 r10:61c88647 r9:85281800 r8:8536f0ac r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:454:4421 is blocked on a mutex likely owned by task kworker/0:201:3787. dd60: 80230ad0 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:455:4422 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:455 state:D stack:0 pid:4422 tgid:4422 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae79d84 r8:00000002 r7:60000013 r6:eae79d8c r5:85288c00 r4:85288c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85288c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae79e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536ec00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85288c00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea983000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8533ff8c r4:8533fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533ff8c r4:8536f100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85288c00 r8:8536f12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8536f100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8536f100 r8:80287e08 r7:eae5de60 r6:85377480 r5:85288c00 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 Call trace: dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) INFO: task kworker/0:456:4425 blocked for more than 456 seconds. r4:8528e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae7de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:457:4427 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:457 state:D stack:0 pid:4427 tgid:4427 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae81d84 r8:00000002 r7:60000113 r6:eae81d8c r5:85290000 r4:85290000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85290000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae81e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85318d00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85290000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacc1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85344f8c r4:85344c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85344f8c r4:8536f200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85290000 r8:8536f22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8536f200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8536f200 r8:80287e08 r7:eae7de60 r6:85377580 r5:85290000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae81fb0 to 0xeae81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8536eb00 INFO: task kworker/0:457:4427 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: a80d4000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) r4:8506c000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85344b8c r4:85344800 r10:61c88647 r9:85291800 r8:8536f2ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe060dd28 to 0xe060dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:85292400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae8de08 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85292400 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa03000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534538c r4:85345000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534538c r4:8536f300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85292400 r8:8536f32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8536f300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8536f300 r8:80287e08 r7:eae81e60 r6:85377680 r5:85292400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae8dfb0 to 0xeae8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8536ee00 INFO: task kworker/0:459:4430 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: a8508000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85293000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae71e08 r5:8534638c r4:85346000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85293000 r8:8536f3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85380100 INFO: task kworker/0:460:4434 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: a8508000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:461:4436 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:461 state:D stack:0 pid:4436 tgid:4436 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac2de08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8534578c r4:85345400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8536f400 r8:80287e08 r7:eae71e60 r6:85377780 r5:85293c00 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85294800 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85345b8c r4:85345800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8536f480 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:463:4441 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:463 state:D stack:0 pid:4441 tgid:4441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead99d84 r8:00000002 r7:60000113 r6:ead99d8c r5:85296000 r4:85296000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85296000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead99e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85380600 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85296000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e010d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85345f8c r4:85345c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85345f8c r4:8536f500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85296000 r8:8536f52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8536f500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8536f500 r8:80287e08 r7:eae71e60 r6:85377880 r5:85296000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead99fb0 to 0xead99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85380480 INFO: task kworker/0:463:4441 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: a8aa0000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85296c00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8534678c r4:85346400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85296c00 r8:8536f5ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe060dd28 to 0xe060dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:194:4443 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:194 state:D stack:0 pid:4443 tgid:4443 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadbdd84 r8:00000002 r7:60000113 r6:eadbdd8c r5:85290c00 r4:85290c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85290c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadbde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85385980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85290c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 r5:851abb8c r4:851ab800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85290c00 r8:853779ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: a9160000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:465:4446 blocked for more than 456 seconds. r5:85298000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85380a00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85298000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05d3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85346b8c r4:85346800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85346b8c r4:8536f600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85298000 r8:8536f62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8536f600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8536f600 r8:80287e08 r7:ead9de60 r6:85377a80 r5:85298000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadddfb0 to 0xeadddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853806c0 INFO: task kworker/0:465:4446 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae0de08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85346f8c r4:85346c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd60: 80230ad0 80239bb0 80000013 ffffffff r4:e060ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 task:kworker/0:467 state:D stack:0 pid:4450 tgid:4450 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:8534778c r4:85347400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534778c r4:8536f700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85299800 r8:8536f72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8536f700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8536f700 r8:80287e08 r7:eae0de60 r6:85377b80 r5:85299800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae91fb0 to 0xeae91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85380980 INFO: task kworker/0:467:4450 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: a94af000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:468:4452 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:468 state:D stack:0 pid:4452 tgid:4452 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:8529a400 r4:00000000 r9:83018005 r8:8529a400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 r5:8534738c r4:85347000 r7:dddced80 r6:83018000 r5:8534738c r4:8536f780 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe060dd28 to 0xe060dd70) r4:e060ddc0 r5:00001000 r4:dfc25000 r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) Not tainted 6.15.0-rc7-syzkaller #0 r5:8529bc00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85380400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8529bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9df000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85347f8c r4:85347c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85347f8c r4:8536f800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8529bc00 r8:8536f82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8536f800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8536f800 r8:80287e08 r7:eae91e60 r6:85377c80 r5:8529bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae9dfb0 to 0xeae9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85380c80 INFO: task kworker/0:469:4454 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: a9ac0000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:470:4456 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:470 state:D stack:0 pid:4456 tgid:4456 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaea5d84 r8:00000002 r7:60000113 r6:eaea5d8c r5:8529d400 r4:8529d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8529d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85380f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8529d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9b7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85347b8c r4:85347800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85347b8c r4:8536f880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8529d400 r8:8536f8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8536f880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8536f880 r8:80287e08 r7:eae9de60 r6:85377d00 r5:8529d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaea5fb0 to 0xeaea5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85380c80 INFO: task kworker/0:470:4456 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: a9cd3000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:471:4458 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:471 state:D stack:0 pid:4458 tgid:4458 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaeadd84 r8:00000002 r7:60000113 r6:eaeadd8c r5:8529b000 r4:8529b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8529b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeade08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538e440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8529b000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab43000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534938c r4:85349000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534938c r4:8536f900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8529b000 r8:8536f92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8536f900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8536f900 r8:80287e08 r7:eae9de60 r6:85377d80 r5:8529b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeadfb0 to 0xeaeadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85380dc0 INFO: task kworker/0:471:4458 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: aa0bb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 r5:00001000 r4:dfc25000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:472:4460 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:472 state:D stack:0 pid:4460 tgid:4460 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaeb5d84 r8:00000002 r7:60000013 r6:eaeb5d8c r5:8529c800 r4:8529c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8529c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeb5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85318a40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8529c800 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534838c r4:85348000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534838c r4:8536f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8529c800 r8:8536f9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8536f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8536f980 r8:80287e08 r7:eaeade60 r6:85377e00 r5:8529c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85318cc0 INFO: task kworker/0:472:4460 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: aa371000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:473:4461 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:473 state:D stack:0 pid:4461 tgid:4461 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaeb9d84 r8:00000002 r7:60000013 r6:eaeb9d8c r5:852a0000 r4:852a0000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852a0000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeb9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85367f80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa59000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534878c r4:85348400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534878c r4:8536fa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852a0000 r8:8536fa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8536fa00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8536fa00 r8:80287e08 r7:eaeade60 r6:85377e80 r5:852a0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85380680 INFO: task kworker/0:473:4461 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: aa637000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:474:4463 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:474 state:D stack:0 pid:4463 tgid:4463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaec1d84 r8:00000002 r7:60000013 r6:eaec1d8c r5:852a1800 r4:852a1800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852a1800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538e040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaa5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85348b8c r4:85348800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85348b8c r4:8536fa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852a1800 r8:8536faac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8536fa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8536fa80 r8:80287e08 r7:eaeade60 r6:85377f00 r5:852a1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec1fb0 to 0xeaec1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538e080 INFO: task kworker/0:474:4463 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: aa805000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:475:4465 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:475 state:D stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaec9d84 r8:00000002 r7:60000013 r6:eaec9d8c r5:852a0c00 r4:852a0c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852a0c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538e2c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852a0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaf5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85348f8c r4:85348c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85348f8c r4:8536fb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852a0c00 r8:8536fb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8536fb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8536fb00 r8:80287e08 r7:eaeade60 r6:85377f80 r5:852a0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538e200 INFO: task kworker/0:475:4465 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: aac7d000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:476:4467 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:476 state:D stack:0 pid:4467 tgid:4467 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadd9d84 r8:00000002 r7:60000013 r6:eadd9d8c r5:84d36000 r4:84d36000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d36000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538e5c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d36000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabcf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534978c r4:85349400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534978c r4:8536fb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d36000 r8:8536fbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8536fb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8536fb80 r8:80287e08 r7:eaeade60 r6:8536fc00 r5:84d36000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadd9fb0 to 0xeadd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538e140 INFO: task kworker/0:476:4467 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: aac7d000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:477:4470 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:477 state:D stack:0 pid:4470 tgid:4470 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaed1d84 r8:00000002 r7:60000113 r6:eaed1d8c r5:84d36c00 r4:84d36c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d36c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538e700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d36c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac29000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85349b8c r4:85349800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85349b8c r4:8536fc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d36c00 r8:8536fcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8536fc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8536fc80 r8:80287e08 r7:eadd9e60 r6:8536fd00 r5:84d36c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaed1fb0 to 0xeaed1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538e240 INFO: task kworker/0:477:4470 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ab0a0000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:478:4473 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:478 state:D stack:0 pid:4473 tgid:4473 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaed5d84 r8:00000002 r7:60000113 r6:eaed5d8c r5:84d34800 r4:84d34800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d34800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538e980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d34800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacfd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534a38c r4:8534a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534a38c r4:8536fd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d34800 r8:8536fdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8536fd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8536fd80 r8:80287e08 r7:eaed1e60 r6:8536fe00 r5:84d34800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaed5fb0 to 0xeaed5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538e6c0 INFO: task kworker/0:478:4473 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ab0a0000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:479:4475 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:479 state:D stack:0 pid:4475 tgid:4475 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaee5d84 r8:00000002 r7:60000113 r6:eaee5d8c r5:84d33c00 r4:84d33c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d33c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538e840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d33c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85349f8c r4:85349c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85349f8c r4:8536fe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d33c00 r8:8536feac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8536fe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8536fe80 r8:80287e08 r7:eaed5e60 r6:8536ff00 r5:84d33c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee5fb0 to 0xeaee5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538e6c0 INFO: task kworker/0:479:4475 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ab4e3000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:480:4476 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:480 state:D stack:0 pid:4476 tgid:4476 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead15d84 r8:00000002 r7:60000113 r6:ead15d8c r5:84d35400 r4:84d35400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d35400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead15e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538ebc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d35400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead0b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534a78c r4:8534a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534a78c r4:8536ff80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d35400 r8:8536ffac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8536ff80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8536ff80 r8:80287e08 r7:eaed5e60 r6:8539a000 r5:84d35400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead15fb0 to 0xead15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538e6c0 INFO: task kworker/0:480:4476 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ab6aa000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:481:4478 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:481 state:D stack:0 pid:4478 tgid:4478 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaee9d84 r8:00000002 r7:60000113 r6:eaee9d8c r5:84d32400 r4:84d32400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d32400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538ecc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d32400 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead35000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534ab8c r4:8534a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534ab8c r4:8539a080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d32400 r8:8539a0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8539a080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8539a080 r8:80287e08 r7:ead15e60 r6:8539a100 r5:84d32400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee9fb0 to 0xeaee9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538ea40 INFO: task kworker/0:481:4478 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ab6aa000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:482:4480 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:482 state:D stack:0 pid:4480 tgid:4480 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaeedd84 r8:00000002 r7:60000113 r6:eaeedd8c r5:84d33000 r4:84d33000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d33000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeede08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538ee40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d33000 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead49000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534af8c r4:8534ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534af8c r4:8539a180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d33000 r8:8539a1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8539a180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8539a180 r8:80287e08 r7:eaee9e60 r6:8539a200 r5:84d33000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeedfb0 to 0xeaeedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538eac0 INFO: task kworker/0:482:4480 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ab92e000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:483:4483 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:483 state:D stack:0 pid:4483 tgid:4483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaef1d84 r8:00000002 r7:60000113 r6:eaef1d8c r5:85295400 r4:85295400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85295400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538efc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85295400 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead59000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534b38c r4:8534b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534b38c r4:8539a280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85295400 r8:8539a2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8539a280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8539a280 r8:80287e08 r7:eaeede60 r6:8539a300 r5:85295400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef1fb0 to 0xeaef1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538ec40 INFO: task kworker/0:483:4483 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ab92e000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:484:4484 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:484 state:D stack:0 pid:4484 tgid:4484 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaef5d84 r8:00000002 r7:60000113 r6:eaef5d8c r5:85286c00 r4:85286c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85286c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a3180 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85286c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead93000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534b78c r4:8534b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534b78c r4:8539a380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85286c00 r8:8539a3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8539a380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8539a380 r8:80287e08 r7:eaef1e60 r6:8539a400 r5:85286c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef5fb0 to 0xeaef5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538edc0 INFO: task kworker/0:484:4484 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: abfd4000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:485:4485 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:485 state:D stack:0 pid:4485 tgid:4485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaefdd84 r8:00000002 r7:60000013 r6:eaefdd8c r5:852e0000 r4:852e0000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852e0000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaefde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a3280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852e0000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534bb8c r4:8534b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534bb8c r4:8539a480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852e0000 r8:8539a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8539a480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8539a480 r8:80287e08 r7:eaef5e60 r6:8539a500 r5:852e0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaefdfb0 to 0xeaefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538edc0 INFO: task kworker/0:485:4485 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ac413000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:486:4487 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:486 state:D stack:0 pid:4487 tgid:4487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf01d84 r8:00000002 r7:60000113 r6:eaf01d8c r5:852e1800 r4:852e1800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852e1800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf01e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a3480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadc1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8534bf8c r4:8534bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8534bf8c r4:8539a580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852e1800 r8:8539a5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8539a580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8539a580 r8:80287e08 r7:eaefde60 r6:8539a600 r5:852e1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf01fb0 to 0xeaf01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853a3080 INFO: task kworker/0:486:4487 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ac413000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:487:4490 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:487 state:D stack:0 pid:4490 tgid:4490 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaef9d84 r8:00000002 r7:60000013 r6:eaef9d8c r5:852e2400 r4:852e2400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852e2400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a36c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadeb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535478c r4:85354400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535478c r4:8539a680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852e2400 r8:8539a6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8539a680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8539a680 r8:80287e08 r7:eaf01e60 r6:8539a700 r5:852e2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef9fb0 to 0xeaef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853a3300 INFO: task kworker/0:487:4490 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ac48e000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:488:4492 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:488 state:D stack:0 pid:4492 tgid:4492 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf05d84 r8:00000002 r7:60000013 r6:eaf05d8c r5:852e0c00 r4:852e0c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852e0c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf05e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a35c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadd3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535438c r4:85354000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535438c r4:8539a780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852e0c00 r8:8539a7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8539a780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8539a780 r8:80287e08 r7:eaef9e60 r6:8539a800 r5:852e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf05fb0 to 0xeaf05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853a3440 INFO: task kworker/0:488:4492 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ac48e000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:489:4494 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:489 state:D stack:0 pid:4494 tgid:4494 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf09d84 r8:00000002 r7:60000113 r6:eaf09d8c r5:852e3000 r4:852e3000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852e3000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf09e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a3880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85354b8c r4:85354800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85354b8c r4:8539a880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852e3000 r8:8539a8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8539a880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8539a880 r8:80287e08 r7:eaef9e60 r6:8539a900 r5:852e3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf09fb0 to 0xeaf09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853a34c0 INFO: task kworker/0:489:4494 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ac7f6000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:490:4496 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:490 state:D stack:0 pid:4496 tgid:4496 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf15d84 r8:00000002 r7:60000013 r6:eaf15d8c r5:852e4800 r4:852e4800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852e4800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf15e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a3b00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852e4800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae11000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85354f8c r4:85354c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85354f8c r4:8539a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852e4800 r8:8539a9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8539a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8539a980 r8:80287e08 r7:eaf09e60 r6:8539aa00 r5:852e4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf15fb0 to 0xeaf15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853a3740 INFO: task kworker/0:490:4496 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ac7f6000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:491:4498 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:491 state:D stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf19d84 r8:00000002 r7:60000113 r6:eaf19d8c r5:852e6000 r4:852e6000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852e6000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf19e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e9040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852e6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf3b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535578c r4:85355400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535578c r4:8539aa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852e6000 r8:8539aaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8539aa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8539aa80 r8:80287e08 r7:eaf15e60 r6:8539ab00 r5:852e6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf19fb0 to 0xeaf19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853a3980 INFO: task kworker/0:491:4498 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ad1d9000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:492:4500 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:492 state:D stack:0 pid:4500 tgid:4500 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf29d84 r8:00000002 r7:60000013 r6:eaf29d8c r5:852e6c00 r4:852e6c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852e6c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf29e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a3d00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf1b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535538c r4:85355000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535538c r4:8539ab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852e6c00 r8:8539abac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8539ab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8539ab80 r8:80287e08 r7:eaf19e60 r6:8539ac00 r5:852e6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf29fb0 to 0xeaf29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853a3b80 INFO: task kworker/0:492:4500 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ad1d9000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:493:4502 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:493 state:D stack:0 pid:4502 tgid:4502 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf39d84 r8:00000002 r7:60000113 r6:eaf39d8c r5:84450000 r4:84450000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84450000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf39e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e9500 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84450000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf57000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85355f8c r4:85355c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85355f8c r4:8539ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84450000 r8:8539acac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8539ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8539ac80 r8:80287e08 r7:eaf19e60 r6:8539ad00 r5:84450000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf39fb0 to 0xeaf39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853a3e00 INFO: task kworker/0:493:4502 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ad54d000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:195:4503 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:195 state:D stack:0 pid:4503 tgid:4503 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf11d84 r8:00000002 r7:60000113 r6:eaf11d8c r5:852a3000 r4:852a3000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852a3000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf11e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ef0c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf43000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851abf8c r4:851abc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:851abf8c r4:853ed000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852a3000 r8:853ed02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853ed000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ed000 r8:80287e08 r7:eae39e60 r6:853ed080 r5:852a3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf11fb0 to 0xeaf11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85385dc0 INFO: task kworker/1:195:4503 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ad778000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:196:4506 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:196 state:D stack:0 pid:4506 tgid:4506 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf35d84 r8:00000002 r7:60000113 r6:eaf35d8c r5:852a4800 r4:852a4800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852a4800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf35e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854145c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9a7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8471bf8c r4:8471bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8471bf8c r4:853ed100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852a4800 r8:853ed12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853ed100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ed100 r8:80287e08 r7:eae39e60 r6:853ed180 r5:852a4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf35fb0 to 0xeaf35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853ef000 INFO: task kworker/1:196:4506 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ad778000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:494:4508 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:494 state:D stack:0 pid:4508 tgid:4508 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf61d84 r8:00000002 r7:60000013 r6:eaf61d8c r5:852a5400 r4:852a5400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852a5400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf61e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e93c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf4f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85355b8c r4:85355800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85355b8c r4:8539ad80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852a5400 r8:8539adac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8539ad80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8539ad80 r8:80287e08 r7:eaf39e60 r6:853ed200 r5:852a5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf61fb0 to 0xeaf61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e9240 INFO: task kworker/0:494:4508 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ad778000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:495:4511 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:495 state:D stack:0 pid:4511 tgid:4511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf89d84 r8:00000002 r7:60000013 r6:eaf89d8c r5:852a6c00 r4:852a6c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852a6c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf89e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e9600 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf6f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535638c r4:85356000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535638c r4:8539ae00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852a6c00 r8:8539ae2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8539ae00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8539ae00 r8:80287e08 r7:eaf39e60 r6:853ed280 r5:852a6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf89fb0 to 0xeaf89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e9380 INFO: task kworker/0:495:4511 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: adb50000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:496:4512 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:496 state:D stack:0 pid:4512 tgid:4512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf91d84 r8:00000002 r7:60000113 r6:eaf91d8c r5:852a6000 r4:852a6000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852a6000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf91e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e9780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa0f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535678c r4:85356400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535678c r4:8539ae80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852a6000 r8:8539aeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8539ae80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8539ae80 r8:80287e08 r7:eaf89e60 r6:853ed300 r5:852a6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf91fb0 to 0xeaf91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e9400 INFO: task kworker/0:496:4512 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: adb50000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:497:4514 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:497 state:D stack:0 pid:4514 tgid:4514 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf99d84 r8:00000002 r7:60000113 r6:eaf99d8c r5:852a2400 r4:852a2400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852a2400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf99e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e9c80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfff3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535778c r4:85357400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535778c r4:8539af00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852a2400 r8:8539af2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8539af00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8539af00 r8:80287e08 r7:eaf91e60 r6:853ed380 r5:852a2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf99fb0 to 0xeaf99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e9580 INFO: task kworker/0:497:4514 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ae0ea000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:498:4516 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:498 state:D stack:0 pid:4516 tgid:4516 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafa1d84 r8:00000002 r7:60000113 r6:eafa1d8c r5:8529e000 r4:8529e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8529e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e9880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8529e000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc23000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85356b8c r4:85356800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85356b8c r4:8539af80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8529e000 r8:8539afac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8539af80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8539af80 r8:80287e08 r7:eaf99e60 r6:853ed400 r5:8529e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafa1fb0 to 0xeafa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e9580 INFO: task kworker/0:498:4516 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ae0ea000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:499:4517 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:499 state:D stack:0 pid:4517 tgid:4517 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafa5d84 r8:00000002 r7:60000113 r6:eafa5d8c r5:852a3c00 r4:852a3c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852a3c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e9a00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcd3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85356f8c r4:85356c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85356f8c r4:853eb000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852a3c00 r8:853eb02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853eb000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853eb000 r8:80287e08 r7:eaf99e60 r6:853ed480 r5:852a3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafa5fb0 to 0xeafa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e9680 INFO: task kworker/0:499:4517 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ae8fa000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:500:4519 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:500 state:D stack:0 pid:4519 tgid:4519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf4dd84 r8:00000002 r7:60000113 r6:eaf4dd8c r5:84451800 r4:84451800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84451800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf4de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e9b00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84451800 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdbb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535738c r4:85357000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535738c r4:853eb080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84451800 r8:853eb0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853eb080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853eb080 r8:80287e08 r7:eaf99e60 r6:853eb100 r5:84451800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf4dfb0 to 0xeaf4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e9a40 INFO: task kworker/0:500:4519 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ae8fa000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:501:4522 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:501 state:D stack:0 pid:4522 tgid:4522 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafb5d84 r8:00000002 r7:60000013 r6:eafb5d8c r5:84452400 r4:84452400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84452400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e9f80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84452400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e053f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85357f8c r4:85357c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85357f8c r4:853eb180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84452400 r8:853eb1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853eb180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853eb180 r8:80287e08 r7:eaf99e60 r6:853eb200 r5:84452400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafb5fb0 to 0xeafb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e9a80 INFO: task kworker/0:501:4522 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: aeb13000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:502:4523 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:502 state:D stack:0 pid:4523 tgid:4523 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf79d84 r8:00000002 r7:60000013 r6:eaf79d8c r5:84453000 r4:84453000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84453000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf79e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e9e00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84453000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0087000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85357b8c r4:85357800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85357b8c r4:853eb280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84453000 r8:853eb2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853eb280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853eb280 r8:80287e08 r7:eafb5e60 r6:853eb300 r5:84453000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf79fb0 to 0xeaf79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e9d40 INFO: task kworker/0:502:4523 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: aeb13000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:503:4526 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:503 state:D stack:0 pid:4526 tgid:4526 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafe9d84 r8:00000002 r7:60000113 r6:eafe9d8c r5:84454800 r4:84454800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84454800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f7540 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84454800 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07c5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535cb8c r4:8535c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535cb8c r4:853eb380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84454800 r8:853eb3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853eb380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853eb380 r8:80287e08 r7:eafb5e60 r6:853eb400 r5:84454800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafe9fb0 to 0xeafe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e9d80 INFO: task kworker/0:503:4526 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: af0ac000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:504:4527 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:504 state:D stack:0 pid:4527 tgid:4527 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaff1d84 r8:00000002 r7:60000113 r6:eaff1d8c r5:84455400 r4:84455400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84455400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f7040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84455400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06c1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535c38c r4:8535c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535c38c r4:853eb480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84455400 r8:853eb4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853eb480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853eb480 r8:80287e08 r7:eafe9e60 r6:853eb500 r5:84455400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaff1fb0 to 0xeaff1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e9d80 INFO: task kworker/0:504:4527 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: af0ac000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:505:4530 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:505 state:D stack:0 pid:4530 tgid:4530 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaff5d84 r8:00000002 r7:60000013 r6:eaff5d8c r5:84453c00 r4:84453c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84453c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f7300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84453c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0781000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535c78c r4:8535c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535c78c r4:853eb580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84453c00 r8:853eb5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853eb580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853eb580 r8:80287e08 r7:eafe9e60 r6:853eb600 r5:84453c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaff5fb0 to 0xeaff5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853f7180 INFO: task kworker/0:505:4530 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: af774000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:506:4532 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:506 state:D stack:0 pid:4532 tgid:4532 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaff9d84 r8:00000002 r7:60000013 r6:eaff9d8c r5:84450c00 r4:84450c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84450c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f7900 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0839000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535d38c r4:8535d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535d38c r4:853eb680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84450c00 r8:853eb6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853eb680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853eb680 r8:80287e08 r7:eafe9e60 r6:853eb700 r5:84450c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaff9fb0 to 0xeaff9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853f73c0 INFO: task kworker/0:506:4532 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: af774000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:507:4533 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:507 state:D stack:0 pid:4533 tgid:4533 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaffdd84 r8:00000002 r7:60000013 r6:eaffdd8c r5:852e5400 r4:852e5400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852e5400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaffde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f7700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07fd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535cf8c r4:8535cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535cf8c r4:853eb780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852e5400 r8:853eb7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853eb780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853eb780 r8:80287e08 r7:eaff9e60 r6:853eb800 r5:852e5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaffdfb0 to 0xeaffdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853f7580 INFO: task kworker/0:507:4533 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: af9e2000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:508:4536 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:508 state:D stack:0 pid:4536 tgid:4536 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb001d84 r8:00000002 r7:60000113 r6:eb001d8c r5:84456000 r4:84456000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84456000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb001e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f7dc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84456000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48f5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535db8c r4:8535d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535db8c r4:853eb880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84456000 r8:853eb8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853eb880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853eb880 r8:80287e08 r7:eaff9e60 r6:853eb900 r5:84456000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb001fb0 to 0xeb001ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853f7780 INFO: task kworker/0:508:4536 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b013c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:509:4538 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:509 state:D stack:0 pid:4538 tgid:4538 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb009d84 r8:00000002 r7:60000113 r6:eb009d8c r5:85420c00 r4:85420c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85420c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb009e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f7b00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85420c00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e086d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535d78c r4:8535d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535d78c r4:853eb980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85420c00 r8:853eb9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853eb980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853eb980 r8:80287e08 r7:eb001e60 r6:853eba00 r5:85420c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb009fb0 to 0xeb009ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853f7980 INFO: task kworker/0:509:4538 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b013c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:510:4541 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:510 state:D stack:0 pid:4541 tgid:4541 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb005d84 r8:00000002 r7:60000013 r6:eb005d8c r5:85421800 r4:85421800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85421800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb005e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f7980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85421800 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e893d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535df8c r4:8535dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535df8c r4:853eba80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85421800 r8:853ebaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853eba80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853eba80 r8:80287e08 r7:eb001e60 r6:853ebb00 r5:85421800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb005fb0 to 0xeb005ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853f7980 INFO: task kworker/0:510:4541 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b061a000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:511:4543 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:511 state:D stack:0 pid:4543 tgid:4543 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafd9d84 r8:00000002 r7:60000113 r6:eafd9d8c r5:85422400 r4:85422400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85422400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fb3c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85422400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac3d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535eb8c r4:8535e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535eb8c r4:853ebb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85422400 r8:853ebbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ebb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ebb80 r8:80287e08 r7:eb005e60 r6:853ebc00 r5:85422400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafd9fb0 to 0xeafd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853f7d40 INFO: task kworker/0:511:4543 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b061a000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:512:4546 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:512 state:D stack:0 pid:4546 tgid:4546 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb011d84 r8:00000002 r7:60000013 r6:eb011d8c r5:85423c00 r4:85423c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85423c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb011e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f7a40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85423c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab57000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535e38c r4:8535e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535e38c r4:853ebc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85423c00 r8:853ebcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ebc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ebc80 r8:80287e08 r7:eafd9e60 r6:853ebd00 r5:85423c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb011fb0 to 0xeb011ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853a3fc0 INFO: task kworker/0:512:4546 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b0bf3000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:513:4547 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:513 state:D stack:0 pid:4547 tgid:4547 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb015d84 r8:00000002 r7:60000113 r6:eb015d8c r5:85424800 r4:85424800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85424800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb015e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e9e80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85424800 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabb7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535e78c r4:8535e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535e78c r4:853ebd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85424800 r8:853ebdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ebd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ebd80 r8:80287e08 r7:eafd9e60 r6:853ebe00 r5:85424800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb015fb0 to 0xeb015ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853f7f40 INFO: task kworker/0:513:4547 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b1106000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:514:4548 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:514 state:D stack:0 pid:4548 tgid:4548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb019d84 r8:00000002 r7:60000113 r6:eb019d8c r5:85425400 r4:85425400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85425400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb019e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fb4c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85425400 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacc3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535ef8c r4:8535ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535ef8c r4:853ebe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85425400 r8:853ebeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ebe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ebe80 r8:80287e08 r7:eafd9e60 r6:853ebf00 r5:85425400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb019fb0 to 0xeb019ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fb080 INFO: task kworker/0:514:4548 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b12a3000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:515:4551 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:515 state:D stack:0 pid:4551 tgid:4551 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb00dd84 r8:00000002 r7:60000013 r6:eb00dd8c r5:85426000 r4:85426000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85426000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb00de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fb5c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85426000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacd9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535f38c r4:8535f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535f38c r4:853ebf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85426000 r8:853ebfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853ebf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ebf80 r8:80287e08 r7:eb019e60 r6:853fa000 r5:85426000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb00dfb0 to 0xeb00dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fb2c0 INFO: task kworker/0:515:4551 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b1546000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:516:4553 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:516 state:D stack:0 pid:4553 tgid:4553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb01dd84 r8:00000002 r7:60000113 r6:eb01dd8c r5:85426c00 r4:85426c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85426c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb01de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fb7c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85426c00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae27000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535f78c r4:8535f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535f78c r4:853fa080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85426c00 r8:853fa0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853fa080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853fa080 r8:80287e08 r7:eb00de60 r6:853fa100 r5:85426c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb01dfb0 to 0xeb01dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fb340 INFO: task kworker/0:516:4553 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b165f000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:517:4555 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:517 state:D stack:0 pid:4555 tgid:4555 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb021d84 r8:00000002 r7:60000113 r6:eb021d8c r5:85423000 r4:85423000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85423000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb021e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fb8c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85423000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae4f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535fb8c r4:8535f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535fb8c r4:853fa180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85423000 r8:853fa1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853fa180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853fa180 r8:80287e08 r7:eb01de60 r6:853fa200 r5:85423000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb021fb0 to 0xeb021ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fb800 INFO: task kworker/0:517:4555 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b17d8000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:518:4557 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:518 state:D stack:0 pid:4557 tgid:4557 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb029d84 r8:00000002 r7:60000013 r6:eb029d8c r5:85420000 r4:85420000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85420000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb029e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fbc00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85420000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafa7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549038c r4:85490000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549038c r4:853fa280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85420000 r8:853fa2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853fa280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853fa280 r8:80287e08 r7:eb021e60 r6:853fa300 r5:85420000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb029fb0 to 0xeb029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fb6c0 INFO: task kworker/0:518:4557 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b1926000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:519:4559 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:519 state:D stack:0 pid:4559 tgid:4559 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb02dd84 r8:00000002 r7:60000113 r6:eb02dd8c r5:84456c00 r4:84456c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84456c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb02de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fba80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84456c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae5f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8535ff8c r4:8535fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8535ff8c r4:853fa380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84456c00 r8:853fa3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853fa380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853fa380 r8:80287e08 r7:eb029e60 r6:853fa400 r5:84456c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb02dfb0 to 0xeb02dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fb900 INFO: task kworker/0:519:4559 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b1dec000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:520:4560 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:520 state:D stack:0 pid:4560 tgid:4560 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb031d84 r8:00000002 r7:60000113 r6:eb031d8c r5:852e3c00 r4:852e3c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852e3c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb031e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85405040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852e3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb03b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85490b8c r4:85490800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85490b8c r4:853fa480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852e3c00 r8:853fa4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853fa480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853fa480 r8:80287e08 r7:eb029e60 r6:853fa500 r5:852e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb031fb0 to 0xeb031ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fbb40 INFO: task kworker/0:520:4560 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b2009000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:521:4563 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:521 state:D stack:0 pid:4563 tgid:4563 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb035d84 r8:00000002 r7:60000013 r6:eb035d8c r5:85428000 r4:85428000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85428000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb035e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fbe00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85428000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafc7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549078c r4:85490400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549078c r4:853fa580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85428000 r8:853fa5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853fa580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853fa580 r8:80287e08 r7:eb031e60 r6:853fa600 r5:85428000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb035fb0 to 0xeb035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fbb40 INFO: task kworker/0:521:4563 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b2133000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:522:4564 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:522 state:D stack:0 pid:4564 tgid:4564 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb039d84 r8:00000002 r7:60000013 r6:eb039d8c r5:85429800 r4:85429800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85429800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb039e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854053c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85429800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549138c r4:85491000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549138c r4:853fa680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85429800 r8:853fa6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853fa680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853fa680 r8:80287e08 r7:eb031e60 r6:853ed500 r5:85429800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb039fb0 to 0xeb039ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853fbb40 INFO: task kworker/0:522:4564 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b2492000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:523:4567 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:523 state:D stack:0 pid:4567 tgid:4567 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb05dd84 r8:00000002 r7:60000113 r6:eb05dd8c r5:852abc00 r4:852abc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852abc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb05de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85405280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb047000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85490f8c r4:85490c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85490f8c r4:853fa700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852abc00 r8:853fa72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853fa700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853fa700 r8:80287e08 r7:eb039e60 r6:853ed580 r5:852abc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb05dfb0 to 0xeb05dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854051c0 INFO: task kworker/0:523:4567 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b2492000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:524:4569 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:524 state:D stack:0 pid:4569 tgid:4569 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb069d84 r8:00000002 r7:60000013 r6:eb069d8c r5:852ac800 r4:852ac800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852ac800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb069e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854056c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852ac800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb077000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85491b8c r4:85491800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85491b8c r4:853fa780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852ac800 r8:853fa7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853fa780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853fa780 r8:80287e08 r7:eb039e60 r6:853ed600 r5:852ac800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb069fb0 to 0xeb069ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85405240 INFO: task kworker/0:524:4569 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b286b000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:525:4570 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:525 state:D stack:0 pid:4570 tgid:4570 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb06dd84 r8:00000002 r7:60000013 r6:eb06dd8c r5:852a9800 r4:852a9800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852a9800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb06de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85405540 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852a9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb06f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549178c r4:85491400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549178c r4:853fa800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852a9800 r8:853fa82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853fa800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853fa800 r8:80287e08 r7:eb069e60 r6:853ed680 r5:852a9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb06dfb0 to 0xeb06dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85405240 INFO: task kworker/0:525:4570 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b2a74000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:526:4573 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:526 state:D stack:0 pid:4573 tgid:4573 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb081d84 r8:00000002 r7:60000013 r6:eb081d8c r5:852ad400 r4:852ad400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852ad400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb081e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85405a80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa1b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549278c r4:85492400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549278c r4:853fa880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852ad400 r8:853fa8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853fa880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853fa880 r8:80287e08 r7:eb069e60 r6:853ed700 r5:852ad400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb081fb0 to 0xeb081ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85405480 INFO: task kworker/0:526:4573 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b2bfa000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:527:4574 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:527 state:D stack:0 pid:4574 tgid:4574 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb08dd84 r8:00000002 r7:60000013 r6:eb08dd8c r5:852ae000 r4:852ae000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852ae000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb08de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85405800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb083000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85491f8c r4:85491c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85491f8c r4:853fa900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852ae000 r8:853fa92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853fa900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853fa900 r8:80287e08 r7:eb081e60 r6:853ed780 r5:852ae000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb08dfb0 to 0xeb08dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854057c0 INFO: task kworker/0:527:4574 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b2e47000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:528:4576 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:528 state:D stack:0 pid:4576 tgid:4576 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb099d84 r8:00000002 r7:60000013 r6:eb099d8c r5:852aec00 r4:852aec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852aec00 r4:8291a680 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb08f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852aec00 r8:853fa9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853fa980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853fa980 r8:80287e08 r7:eb081e60 r6:853ed800 r5:852aec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb099fb0 to 0xeb099ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85405740 INFO: task kworker/0:528:4576 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b32a2000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:529:4579 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:529 state:D stack:0 pid:4579 tgid:4579 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaed9d84 r8:00000002 r7:60000013 r6:eaed9d8c r5:852a8000 r4:852a8000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852a8000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85405d00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85492f8c r4:85492c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e060ddc0 r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:530:4580 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:530 state:D stack:0 pid:4580 tgid:4580 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb025d84 r8:00000002 r7:60000113 r6:eb025d8c r5:8542a400 r4:8542a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8542a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb025e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85405b80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8542a400 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa73000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85492b8c r4:85492800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85492b8c r4:853faa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8542a400 r8:853faaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853faa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853faa80 r8:80287e08 r7:eaed9e60 r6:853fab00 r5:8542a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb025fb0 to 0xeb025ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85405900 INFO: task kworker/0:530:4580 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b3499000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eaec5d84 r8:00000002 r7:60000113 r6:eaec5d8c r5:8542bc00 r4:8542bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8542bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85405ec0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549338c r4:85493000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:853fab80 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b36ec000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:e01f5000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85493b8c r4:85493800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85493b8c r4:853fac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8542c800 r8:853facac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853fac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853fac80 r8:80287e08 r7:eaec5e60 r6:853fad00 r5:8542c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee1fb0 to 0xeaee1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85405d40 INFO: task kworker/0:532:4586 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 Exception stack(0xe060dd28 to 0xe060dd70) dd20: b3b9c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eaf31d84 r8:00000002 r7:60000013 r6:eaf31d8c r5:8542e000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549378c r4:85493400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:853fad80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853fad80 r8:80287e08 r7:eaee1e60 r6:853fae00 r5:8542e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf31fb0 to 0xeaf31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853eff80 INFO: task kworker/0:533:4588 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b3b9c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 r4:8506c000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ea9f7000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549878c r4:85498400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549878c r4:853fae80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8542ec00 r8:853faeac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:853fae80 r8:80287e08 r7:eaee1e60 r6:853faf00 r5:8542ec00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe060dd28 to 0xe060dd70) r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:535:4590 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:535 state:D stack:0 pid:4590 tgid:4590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb09dd84 r8:00000002 r7:60000013 r6:eb09dd8c r5:8542b000 r4:8542b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8542b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb09de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85418340 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8542b000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05e5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85493f8c r4:85493c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85493f8c r4:853faf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8542b000 r8:853fafac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853faf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853faf80 r8:80287e08 r7:eaf49e60 r6:85416000 r5:8542b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb09dfb0 to 0xeb09dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85418040 INFO: task kworker/0:535:4590 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b4007000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:536:4593 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:536 state:D stack:0 pid:4593 tgid:4593 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0a5d84 r8:00000002 r7:60000113 r6:eb0a5d8c r5:85428c00 r4:85428c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85428c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85418740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85428c00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9d3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549838c r4:85498000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549838c r4:85416080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85428c00 r8:854160ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85416080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85416080 r8:80287e08 r7:eaf49e60 r6:85416100 r5:85428c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0a5fb0 to 0xeb0a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85418280 INFO: task kworker/0:536:4593 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b406d000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:197:4594 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:197 state:D stack:0 pid:4594 tgid:4594 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb045d84 r8:00000002 r7:60000113 r6:eb045d8c r5:852a8c00 r4:852a8c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852a8c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb045e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f5600 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacd7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a1f8c r4:854a1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854a1f8c r4:853ed900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852a8c00 r8:853ed92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853ed900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ed900 r8:80287e08 r7:eae39e60 r6:853ed980 r5:852a8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb045fb0 to 0xeb045ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854143c0 INFO: task kworker/1:197:4594 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b4368000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:537:4598 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:537 state:D stack:0 pid:4598 tgid:4598 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0a1d84 r8:00000002 r7:60000013 r6:eb0a1d8c r5:852ab000 r4:852ab000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852ab000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85418d40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852ab000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549978c r4:85499400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549978c r4:85416180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852ab000 r8:854161ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85416180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85416180 r8:80287e08 r7:eaf49e60 r6:853eda00 r5:852ab000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0a1fb0 to 0xeb0a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85418540 INFO: task kworker/0:537:4598 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b45d5000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:538:4599 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:538 state:D stack:0 pid:4599 tgid:4599 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0add84 r8:00000002 r7:60000013 r6:eb0add8c r5:852aa400 r4:852aa400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:852aa400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0ade08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854189c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa63000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85498b8c r4:85498800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85498b8c r4:85416200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:852aa400 r8:8541622c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85416200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85416200 r8:80287e08 r7:eb0a1e60 r6:853eda80 r5:852aa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0adfb0 to 0xeb0adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85418540 INFO: task kworker/0:538:4599 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b47ee000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:539:4601 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:539 state:D stack:0 pid:4601 tgid:4601 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0b1d84 r8:00000002 r7:60000113 r6:eb0b1d8c r5:8529ec00 r4:8529ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8529ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85418ac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8529ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85498f8c r4:85498c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85498f8c r4:85416280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8529ec00 r8:854162ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85416280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85416280 r8:80287e08 r7:eb0a1e60 r6:853edb00 r5:8529ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0b1fb0 to 0xeb0b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85418a00 INFO: task kworker/0:539:4601 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b4a1d000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:540:4604 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:540 state:D stack:0 pid:4604 tgid:4604 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0b5d84 r8:00000002 r7:60000013 r6:eb0b5d8c r5:85458000 r4:85458000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85458000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85418c00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85458000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab3d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549938c r4:85499000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549938c r4:85416300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85458000 r8:8541632c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85416300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85416300 r8:80287e08 r7:eb0a1e60 r6:853edb80 r5:85458000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0b5fb0 to 0xeb0b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85418b00 INFO: task kworker/0:540:4604 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b4ca4000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85499b8c r4:85499800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85499b8c r4:85416380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85458c00 r8:854163ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85416380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85416380 r8:80287e08 r7:eb0a1e60 r6:853edc00 r5:85458c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0b9fb0 to 0xeb0b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85418b00 INFO: task kworker/0:541:4606 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b4d58000 eca69000 00000001 80239b98 7f23f000 00000001 r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:84d91880 r4:8506c000 Call trace: [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b5109000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549a38c r4:8549a000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85416480 r8:80287e08 r7:eb0bde60 r6:853edd00 r5:8545a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0c1fb0 to 0xeb0c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85418e40 INFO: task kworker/0:543:4609 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b5109000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549a78c r4:8549a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549a78c r4:85416500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8545b000 r8:8541652c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85416500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85416500 r8:80287e08 r7:eb0c1e60 r6:853edd80 r5:8545b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0c5fb0 to 0xeb0c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:dfc25000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Call trace: r4:00000000 r5:00001000 r4:ead57000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeb0d1fb0 to 0xeb0d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854151c0 INFO: task kworker/0:545:4615 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b54ab000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8506c000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854153c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8545bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead9f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549af8c r4:8549ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549af8c r4:85416600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8545bc00 r8:8541662c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85416600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85416600 r8:80287e08 r7:eb0d1e60 r6:853ede80 r5:8545bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d5fb0 to 0xeb0d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85415300 INFO: task kworker/0:546:4616 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b58ae000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8506c000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0dde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854156c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8545ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadd1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549b78c r4:8549b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549b78c r4:85416680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8545ec00 r8:854166ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85416680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85416680 r8:80287e08 r7:eb0d5e60 r6:853edf00 r5:8545ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0ddfb0 to 0xeb0ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85415240 INFO: task kworker/0:547:4618 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b5a6d000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r5:84fdf38c r4:84fdf000 r4:84d91880 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0e1d84 r8:00000002 r7:60000113 r6:eb0e1d8c r5:85460000 r4:85460000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85460000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854155c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85460000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549b38c r4:8549b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549b38c r4:85416700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85460000 r8:8541672c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85416700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85416700 r8:80287e08 r7:eb0dde60 r6:853edf80 r5:85460000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0e1fb0 to 0xeb0e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85415240 INFO: task kworker/0:548:4619 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b5cc4000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:84fdf38c r4:84fdf000 r4:84d91880 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0edd84 r8:00000002 r7:60000113 r6:eb0edd8c r5:85462400 r4:85462400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85462400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0ede08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85415800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85462400 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549bb8c r4:8549b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549bb8c r4:85416780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85462400 r8:854167ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85416780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85416780 r8:80287e08 r7:eb0dde60 r6:854d1000 r5:85462400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0edfb0 to 0xeb0edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854154c0 INFO: task kworker/0:549:4622 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 dd60: 80230ad0 80239bb0 80000013 ffffffff r4:e060ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84d91880 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0f9d84 r8:00000002 r7:60000013 r6:eb0f9d8c r5:85461800 r4:85461800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85461800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85415900 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85461800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae03000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549bf8c r4:8549bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549bf8c r4:85416800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85461800 r8:8541682c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85416800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85416800 r8:80287e08 r7:eb0ede60 r6:854d1080 r5:85461800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0f9fb0 to 0xeb0f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85415680 INFO: task kworker/0:550:4625 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b5fae000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549c38c r4:8549c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85463c00 r8:854168ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85415680 INFO: task kworker/0:551:4626 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b61d6000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:552:4627 blocked for more than 458 seconds. r10:8291a684 r9:eb101d84 r8:00000002 r7:60000013 r6:eb101d8c r5:85460c00 r4:00000000 r4:00000000 r5:00001000 r4:eaea7000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549c78c r4:8549c400 r10:61c88647 r9:85460c00 r8:8541692c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85416900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85416900 r8:80287e08 r7:eb0fde60 r6:854d1180 r5:85460c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb101fb0 to 0xeb101ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85415980 INFO: task kworker/0:552:4627 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b6439000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:553:4630 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:553 state:D stack:0 pid:4630 tgid:4630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb10dd84 r8:00000002 r7:60000013 r6:eb10dd8c r5:85463000 r4:85463000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85463000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb10de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85415d00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85463000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaebb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549cb8c r4:8549c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549cb8c r4:85416980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85463000 r8:854169ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85416980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85416980 r8:80287e08 r7:eb101e60 r6:854d1200 r5:85463000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb10dfb0 to 0xeb10dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854159c0 INFO: task kworker/0:553:4630 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b66cb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 r4:00000000 r5:00001000 r4:dfc25000 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaedd000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549cf8c r4:8549cc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r5:84fdf38c r4:84fdf000 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:555:4634 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:555 state:D stack:0 pid:4634 tgid:4634 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb11dd84 r8:00000002 r7:60000013 r6:eb11dd8c r5:85466c00 r4:85466c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85466c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb11de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85415f80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eaf3f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549d38c r4:8549d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r5:80000013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r5:00001000 r4:dfc25000 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:556:4636 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:556 state:D stack:0 pid:4636 tgid:4636 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb125d84 r8:00000002 r7:60000113 r6:eb125d8c r5:8545e000 r4:8545e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8545e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb125e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85414c40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8545e000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549d78c r4:8549d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549d78c r4:85416b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8545e000 r8:85416b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85416b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85416b00 r8:80287e08 r7:eb11de60 r6:854d1380 r5:8545e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb125fb0 to 0xeb125ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85415b80 INFO: task kworker/0:556:4636 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b6f97000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85416b80 r4:85414080 Exception stack(0xe060dd28 to 0xe060dd70) dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:558:4639 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:558 state:D stack:0 pid:4639 tgid:4639 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8291a684 r9:eb131d84 r8:00000002 r7:60000113 r6:eb131d8c r5:85468000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a0f8c r4:854a0c00 r4:85416c00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd20: b748a000 eca69000 00000001 80239b98 7f23f000 00000001 r5:00001000 r4:dfc25000 r4:84d91880 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85418380 INFO: task kworker/0:559:4641 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b771c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:560:4643 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:560 state:D stack:0 pid:4643 tgid:4643 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb145d84 r8:00000002 r7:60000013 r6:eb145d8c r5:8546a400 r4:8546a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8546a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb145e08 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eb147000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549e38c r4:8549e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549e38c r4:85416d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8546a400 r8:85416d2c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfc25000 r4:84d91880 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8506c000 Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:561 state:D stack:0 pid:4646 tgid:4646 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb04dd84 r8:00000002 r7:60000013 r6:eb04dd8c r5:8546bc00 r4:8546bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8546bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb04de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854df440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8546bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa37000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549e78c r4:8549e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549e78c r4:85416d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8546bc00 r8:85416dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85416d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85416d80 r8:80287e08 r7:eb131e60 r6:854d1600 r5:8546bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb04dfb0 to 0xeb04dff8) task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8506c000 r4:8546c800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854df540 r7:dddced80 r6:83018000 r5:8549eb8c r4:85416e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85416e00 r8:80287e08 r7:eb131e60 r6:854d1680 r5:8546c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb061fb0 to 0xeb061ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854df240 INFO: task kworker/0:562:4647 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b7c5b000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 r5:84fdf38c r4:84fdf000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb089d84 r8:00000002 r7:60000113 r6:eb089d8c r5:8546e000 r4:8546e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8546e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb089e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854df6c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8546e000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd91000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549ef8c r4:8549ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549ef8c r4:85416e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8546e000 r8:85416eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85416e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85416e80 r8:80287e08 r7:eb131e60 r6:854d1700 r5:8546e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb089fb0 to 0xeb089ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854df2c0 INFO: task kworker/0:563:4649 is blocked on a mutex likely owned by task kworker/0:201:3787. Call trace: dd60: 80230ad0 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:564:4651 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:564 state:D stack:0 pid:4651 tgid:4651 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb151d84 r8:00000002 r7:60000113 r6:eb151d8c r5:8546d400 r4:8546d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8546d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb151e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854df840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8546d400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549f38c r4:8549f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549f38c r4:85416f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8546d400 r8:85416f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85416f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85416f00 r8:80287e08 r7:eb131e60 r6:854d1780 r5:8546d400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549f78c r4:8549f400 r7:dddced80 r6:83018000 r5:8549f78c r4:85416f80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854df740 INFO: task kworker/0:565:4653 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b836b000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:566:4655 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:566 state:D stack:0 pid:4655 tgid:4655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb161d84 r8:00000002 r7:60000113 r6:eb161d8c r5:8546b000 r4:8546b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8546b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb161e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dfac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8546b000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549fb8c r4:8549f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549fb8c r4:854ea000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8546b000 r8:854ea02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ea000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ea000 r8:80287e08 r7:eb131e60 r6:854d1880 r5:8546b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb161fb0 to 0xeb161ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854df700 INFO: task kworker/0:566:4655 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b836b000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:567:4657 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:567 state:D stack:0 pid:4657 tgid:4657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb169d84 r8:00000002 r7:60000113 r6:eb169d8c r5:85464800 r4:85464800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85464800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb169e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:e077f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549ff8c r4:8549fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfc25000 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:568 state:D stack:0 pid:4659 tgid:4659 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb171e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a038c r4:854a0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a038c r4:854ea100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85466000 r8:854ea12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ea100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ea100 r8:80287e08 r7:eb131e60 r6:854d1980 r5:85466000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb171fb0 to 0xeb171ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854dfb80 INFO: task kworker/0:568:4659 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b8b2c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:569:4661 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:569 state:D stack:0 pid:4661 tgid:4661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb179d84 r8:00000002 r7:60000113 r6:eb179d8c r5:85470c00 r4:85470c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85470c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb179e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dfe40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85470c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e081b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a078c r4:854a0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a078c r4:854ea180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85470c00 r8:854ea1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ea180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ea180 r8:80287e08 r7:eb131e60 r6:854d1a00 r5:85470c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb179fb0 to 0xeb179ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854dfa40 INFO: task kworker/0:569:4661 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b8b2c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:570:4663 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:570 state:D stack:0 pid:4663 tgid:4663 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb181d84 r8:00000002 r7:60000013 r6:eb181d8c r5:85472400 r4:85472400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85472400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb181e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dffc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85472400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e085d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a0b8c r4:854a0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a0b8c r4:854ea200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85472400 r8:854ea22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ea200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ea200 r8:80287e08 r7:eb131e60 r6:854d1a80 r5:85472400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb181fb0 to 0xeb181ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854dfc40 INFO: task kworker/0:570:4663 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b8e25000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:571:4666 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:571 state:D stack:0 pid:4666 tgid:4666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb185d84 r8:00000002 r7:60000013 r6:eb185d8c r5:85470000 r4:85470000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85470000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb185e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85414300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85470000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e891d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a138c r4:854a1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a138c r4:854ea280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85470000 r8:854ea2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ea280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ea280 r8:80287e08 r7:eb131e60 r6:854d1b00 r5:85470000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb185fb0 to 0xeb185ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85414240 INFO: task kworker/0:571:4666 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b8e25000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:572:4668 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:572 state:D stack:0 pid:4668 tgid:4668 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0c9d84 r8:00000002 r7:60000013 r6:eb0c9d8c r5:84c63000 r4:84c63000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c63000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f5ac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c63000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae6d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a278c r4:854a2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a278c r4:854ea300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c63000 r8:854ea32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ea300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ea300 r8:80287e08 r7:eb185e60 r6:854ea380 r5:84c63000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0c9fb0 to 0xeb0c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854dfec0 INFO: task kworker/0:572:4668 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b9163000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:573:4671 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:573 state:D stack:0 pid:4671 tgid:4671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb18dd84 r8:00000002 r7:60000113 r6:eb18dd8c r5:84c62400 r4:84c62400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c62400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb18de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f5040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c62400 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabbf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a178c r4:854a1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a178c r4:854ea400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c62400 r8:854ea42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ea400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ea400 r8:80287e08 r7:eb0c9e60 r6:854ea480 r5:84c62400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb18dfb0 to 0xeb18dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f5100 INFO: task kworker/0:573:4671 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b9163000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:574:4673 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:574 state:D stack:0 pid:4673 tgid:4673 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb191d84 r8:00000002 r7:60000013 r6:eb191d8c r5:84c60000 r4:84c60000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c60000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb191e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f5400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c60000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a1b8c r4:854a1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a1b8c r4:854ea500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c60000 r8:854ea52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ea500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ea500 r8:80287e08 r7:eb0c9e60 r6:854ea580 r5:84c60000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb191fb0 to 0xeb191ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f5000 INFO: task kworker/0:574:4673 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b94c7000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:575:4674 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:575 state:D stack:0 pid:4674 tgid:4674 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb195d84 r8:00000002 r7:60000013 r6:eb195d8c r5:84c64800 r4:84c64800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c64800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb195e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f59c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c64800 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae57000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a238c r4:854a2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a238c r4:854ea600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c64800 r8:854ea62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ea600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ea600 r8:80287e08 r7:eb0c9e60 r6:854ea680 r5:84c64800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb195fb0 to 0xeb195ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f5540 INFO: task kworker/0:575:4674 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b980d000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:198:4676 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:198 state:D stack:0 pid:4676 tgid:4676 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb17dd84 r8:00000002 r7:60000113 r6:eb17dd8c r5:85473000 r4:85473000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85473000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb17de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f9500 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85473000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae29000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8471b78c r4:8471b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8471b78c r4:854d1b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85473000 r8:854d1bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d1b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d1b80 r8:80287e08 r7:eae39e60 r6:854d1c00 r5:85473000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb17dfb0 to 0xeb17dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f9200 INFO: task kworker/1:198:4676 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: b99f9000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:199:4678 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:199 state:D stack:0 pid:4678 tgid:4678 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb199d84 r8:00000002 r7:60000113 r6:eb199d8c r5:85473c00 r4:85473c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85473c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb199e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550f780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85473c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb26b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84058b8c r4:84058800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84058b8c r4:854d1c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85473c00 r8:854d1cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d1c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d1c80 r8:80287e08 r7:eae39e60 r6:854d1d00 r5:85473c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb199fb0 to 0xeb199ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f9300 INFO: task kworker/1:199:4678 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ba197000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:576:4681 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:576 state:D stack:0 pid:4681 tgid:4681 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb189d84 r8:00000002 r7:60000113 r6:eb189d8c r5:85474800 r4:85474800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85474800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb189e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f5c00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85474800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf95000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a2b8c r4:854a2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a2b8c r4:854ea700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85474800 r8:854ea72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ea700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ea700 r8:80287e08 r7:eb0c9e60 r6:854d1d80 r5:85474800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb189fb0 to 0xeb189ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f58c0 INFO: task kworker/0:576:4681 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ba2dd000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:577:4683 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:577 state:D stack:0 pid:4683 tgid:4683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1a5d84 r8:00000002 r7:60000113 r6:eb1a5d8c r5:85476000 r4:85476000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85476000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f5d00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85476000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a2f8c r4:854a2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a2f8c r4:854ea780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85476000 r8:854ea7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ea780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ea780 r8:80287e08 r7:eb189e60 r6:854d1e00 r5:85476000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1a5fb0 to 0xeb1a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f5a80 INFO: task kworker/0:577:4683 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ba4e9000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:578:4685 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:578 state:D stack:0 pid:4685 tgid:4685 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1add84 r8:00000002 r7:60000113 r6:eb1add8c r5:85471800 r4:85471800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85471800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1ade08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f5e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85471800 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafd1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a338c r4:854a3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a338c r4:854ea800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85471800 r8:854ea82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ea800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ea800 r8:80287e08 r7:eb1a5e60 r6:854d1e80 r5:85471800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1adfb0 to 0xeb1adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f5b00 INFO: task kworker/0:578:4685 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ba730000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:579:4687 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:579 state:D stack:0 pid:4687 tgid:4687 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1b5d84 r8:00000002 r7:60000113 r6:eb1b5d8c r5:85475400 r4:85475400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85475400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f5340 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85475400 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb071000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a3b8c r4:854a3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a3b8c r4:854ea880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85475400 r8:854ea8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ea880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ea880 r8:80287e08 r7:eb1ade60 r6:854d1f00 r5:85475400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1b5fb0 to 0xeb1b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f5cc0 INFO: task kworker/0:579:4687 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ba852000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:580:4688 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:580 state:D stack:0 pid:4688 tgid:4688 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1b9d84 r8:00000002 r7:60000113 r6:eb1b9d8c r5:85478000 r4:85478000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85478000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f5900 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85478000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb049000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a378c r4:854a3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a378c r4:854ea900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85478000 r8:854ea92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ea900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ea900 r8:80287e08 r7:eb1b5e60 r6:854d1f80 r5:85478000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1b9fb0 to 0xeb1b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f5dc0 INFO: task kworker/0:580:4688 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: baa76000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:581:4690 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:581 state:D stack:0 pid:4690 tgid:4690 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1c1d84 r8:00000002 r7:60000013 r6:eb1c1d8c r5:85479800 r4:85479800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85479800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ff040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85479800 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1d7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a438c r4:854a4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a438c r4:854ea980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85479800 r8:854ea9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ea980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ea980 r8:80287e08 r7:eb1b5e60 r6:854fe000 r5:85479800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1c1fb0 to 0xeb1c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f5e00 INFO: task kworker/0:581:4690 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: bac8c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:582:4692 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:582 state:D stack:0 pid:4692 tgid:4692 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1d1d84 r8:00000002 r7:60000013 r6:eb1d1d8c r5:85478c00 r4:85478c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85478c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85418380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85478c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb085000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a3f8c r4:854a3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a3f8c r4:854eaa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85478c00 r8:854eaa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854eaa00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854eaa00 r8:80287e08 r7:eb1c1e60 r6:854fe080 r5:85478c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1d1fb0 to 0xeb1d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85418280 INFO: task kworker/0:582:4692 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: baead000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:583:4696 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:583 state:D stack:0 pid:4696 tgid:4696 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1f1d84 r8:00000002 r7:60000013 r6:eb1f1d8c r5:8547a400 r4:8547a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8547a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ff280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8547a400 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1e3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a478c r4:854a4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a478c r4:854eaa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8547a400 r8:854eaaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854eaa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854eaa80 r8:80287e08 r7:eb1c1e60 r6:854fe100 r5:8547a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1f1fb0 to 0xeb1f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854ff1c0 INFO: task kworker/0:583:4696 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: bb54b000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:584:4699 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:584 state:D stack:0 pid:4699 tgid:4699 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb20dd84 r8:00000002 r7:60000113 r6:eb20dd8c r5:8547bc00 r4:8547bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8547bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb20de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ff540 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8547bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1ff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a4f8c r4:854a4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a4f8c r4:854eab00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8547bc00 r8:854eab2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854eab00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854eab00 r8:80287e08 r7:eb1f1e60 r6:854fe180 r5:8547bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb20dfb0 to 0xeb20dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854ff100 INFO: task kworker/0:584:4699 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: bb54b000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:585:4700 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:585 state:D stack:0 pid:4700 tgid:4700 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb215d84 r8:00000002 r7:60000113 r6:eb215d8c r5:8547c800 r4:8547c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8547c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb215e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ff440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8547c800 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1f3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a4b8c r4:854a4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a4b8c r4:854eab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8547c800 r8:854eabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854eab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854eab80 r8:80287e08 r7:eb20de60 r6:854fe200 r5:8547c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb215fb0 to 0xeb215ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854ff100 INFO: task kworker/0:585:4700 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: bb911000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:586:4702 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:586 state:D stack:0 pid:4702 tgid:4702 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb229d84 r8:00000002 r7:60000013 r6:eb229d8c r5:8547b000 r4:8547b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8547b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb229e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ff700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8547b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb20f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a538c r4:854a5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a538c r4:854eac00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8547b000 r8:854eac2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854eac00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854eac00 r8:80287e08 r7:eb20de60 r6:854fe280 r5:8547b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb229fb0 to 0xeb229ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854ff6c0 INFO: task kworker/0:586:4702 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: bbdb7000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:587:4704 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:587 state:D stack:0 pid:4704 tgid:4704 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb231d84 r8:00000002 r7:60000013 r6:eb231d8c r5:85468c00 r4:85468c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85468c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb231e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ff780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85468c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb21f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a578c r4:854a5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a578c r4:854eac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85468c00 r8:854eacac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854eac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854eac80 r8:80287e08 r7:eb229e60 r6:854fe300 r5:85468c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb231fb0 to 0xeb231ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854ff580 INFO: task kworker/0:587:4704 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: bbdb7000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:588:4706 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:588 state:D stack:0 pid:4706 tgid:4706 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb241d84 r8:00000002 r7:60000113 r6:eb241d8c r5:8547e000 r4:8547e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8547e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb241e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ff900 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8547e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb233000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a5b8c r4:854a5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a5b8c r4:854ead00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8547e000 r8:854ead2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ead00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ead00 r8:80287e08 r7:eb231e60 r6:854fe380 r5:8547e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb241fb0 to 0xeb241ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854ff100 INFO: task kworker/0:588:4706 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: bbdb7000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:589:4707 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:589 state:D stack:0 pid:4707 tgid:4707 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb249d84 r8:00000002 r7:60000113 r6:eb249d8c r5:85476c00 r4:85476c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85476c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb249e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ffd80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85476c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb273000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a678c r4:854a6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a678c r4:854ead80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85476c00 r8:854eadac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ead80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ead80 r8:80287e08 r7:eb241e60 r6:854fe400 r5:85476c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb249fb0 to 0xeb249ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854ff100 INFO: task kworker/0:589:4707 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: bc2fd000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:590:4709 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:590 state:D stack:0 pid:4709 tgid:4709 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb261d84 r8:00000002 r7:60000113 r6:eb261d8c r5:85480c00 r4:85480c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85480c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb261e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ffac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85480c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb243000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a5f8c r4:854a5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a5f8c r4:854eae00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85480c00 r8:854eae2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854eae00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854eae00 r8:80287e08 r7:eb249e60 r6:854fe480 r5:85480c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb261fb0 to 0xeb261ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854ff940 INFO: task kworker/0:590:4709 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: bc6a7000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:591:4710 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:591 state:D stack:0 pid:4710 tgid:4710 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb265d84 r8:00000002 r7:60000113 r6:eb265d8c r5:85481800 r4:85481800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85481800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb265e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ffb80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85481800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb253000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a638c r4:854a6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a638c r4:854eae80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85481800 r8:854eaeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854eae80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854eae80 r8:80287e08 r7:eb249e60 r6:854fe500 r5:85481800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb265fb0 to 0xeb265ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854ff940 INFO: task kworker/0:591:4710 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: bc996000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:592:4712 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:592 state:D stack:0 pid:4712 tgid:4712 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb269d84 r8:00000002 r7:60000013 r6:eb269d8c r5:85482400 r4:85482400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85482400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb269e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f5480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85482400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2c3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a7b8c r4:854a7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a7b8c r4:854eaf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85482400 r8:854eaf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854eaf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854eaf00 r8:80287e08 r7:eb249e60 r6:854fe580 r5:85482400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb269fb0 to 0xeb269ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854ffa00 INFO: task kworker/0:592:4712 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: bcc20000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:200:4715 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:200 state:D stack:0 pid:4715 tgid:4715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb281d84 r8:00000002 r7:60000113 r6:eb281d8c r5:85484800 r4:85484800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85484800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb281e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f9c00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85484800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2a3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a738c r4:854a7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854a738c r4:854fe600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85484800 r8:854fe62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854fe600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fe600 r8:80287e08 r7:eae39e60 r6:854fe680 r5:85484800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb281fb0 to 0xeb281ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8550f800 INFO: task kworker/1:200:4715 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: bcf70000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:593:4716 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:593 state:D stack:0 pid:4716 tgid:4716 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb251d84 r8:00000002 r7:60000013 r6:eb251d8c r5:84c66000 r4:84c66000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c66000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb251e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854fff00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c66000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a6b8c r4:854a6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a6b8c r4:854eaf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c66000 r8:854eafac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854eaf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854eaf80 r8:80287e08 r7:eb269e60 r6:8550d000 r5:84c66000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb251fb0 to 0xeb251ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854ffc00 INFO: task kworker/0:593:4716 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: bcf70000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:594:4719 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:594 state:D stack:0 pid:4719 tgid:4719 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb27dd84 r8:00000002 r7:60000113 r6:eb27dd8c r5:84c66c00 r4:84c66c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c66c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb27de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ffb40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c66c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb28f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a6f8c r4:854a6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a6f8c r4:8550d080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c66c00 r8:8550d0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8550d080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550d080 r8:80287e08 r7:eb269e60 r6:8550d100 r5:84c66c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb27dfb0 to 0xeb27dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f9d80 INFO: task kworker/0:594:4719 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe060dd28 to 0xe060dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84c65400 r8:8550d1ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe060dd28 to 0xe060dd70) dd20: bd581000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:201:4723 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:201 state:D stack:0 pid:4723 tgid:4723 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2d5d84 r8:00000002 r7:60000113 r6:eb2d5d8c r5:85483000 r4:85483000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85483000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551a780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe060dd28 to 0xe060dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:8506c000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551a140 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85485400 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa1d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854a7f8c r4:854a7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854a7f8c r4:8550d280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85485400 r8:8550d2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8550d280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550d280 r8:80287e08 r7:eb269e60 r6:854fe800 r5:85485400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf21fb0 to 0xeaf21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f5740 INFO: task kworker/0:596:4724 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: bdde4000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8506c000 task:kworker/0:597 state:D stack:0 pid:4725 tgid:4725 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551a280 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfab5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ac38c r4:854ac000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ac38c r4:8550d300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85486000 r8:8550d32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8550d300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550d300 r8:80287e08 r7:eaf21e60 r6:854fe880 r5:85486000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0e5fb0 to 0xeb0e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f9b00 INFO: task kworker/0:597:4725 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: be17b000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb105d84 r8:00000002 r7:60000013 r6:eb105d8c r5:85486c00 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ad38c r4:854ad000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: be17b000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:599:4731 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:599 state:D stack:0 pid:4731 tgid:4731 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551a3c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ac78c r4:854ac400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb111fb0 to 0xeb111ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8551a100 INFO: task kworker/0:599:4731 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: be2cc000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r5:00001000 r4:dfc25000 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb109e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacf3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c138c r4:855c1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855c138c r4:854fea00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8547ec00 r8:854fea2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854fea00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854fea00 r8:80287e08 r7:eae39e60 r6:854fea80 r5:8547ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb109fb0 to 0xeb109ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8550f680 INFO: task kworker/1:202:4734 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: be2cc000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84d91880 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ad78c r4:854ad400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8550d480 r8:80287e08 r7:eb105e60 r6:854feb00 r5:85480000 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:601:4738 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:601 state:D stack:0 pid:4738 tgid:4738 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2ddd84 r8:00000002 r7:60000013 r6:eb2ddd8c r5:84e00c00 r4:84e00c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e00c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2dde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551ab40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e00c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854adb8c r4:854ad800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854adb8c r4:8550d500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e00c00 r8:8550d52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8550d500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550d500 r8:80287e08 r7:eb2b5e60 r6:854feb80 r5:84e00c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2ddfb0 to 0xeb2ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8551a880 INFO: task kworker/0:601:4738 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: be85a000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84d91880 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eb2e5d84 r8:00000002 r7:60000113 r6:eb2e5d8c r5:84e02400 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e5fb0 to 0xeb2e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8551a880 INFO: task kworker/0:602:4740 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: beede000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaa21000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854adf8c r4:854adc00 r7:dddced80 r6:83018000 r5:854adf8c r4:8550d600 r10:00000000 r9:8550d600 r8:80287e08 r7:eb2e5e60 r6:854fec80 r5:84e00000 r4:8551a880 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:604:4743 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:604 state:D stack:0 pid:4743 tgid:4743 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2d1d84 r8:00000002 r7:60000013 r6:eb2d1d8c r5:84c61800 r4:84c61800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84c61800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551ac80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c61800 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaadd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ae38c r4:854ae000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ae38c r4:8550d680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c61800 r8:8550d6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8550d680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550d680 r8:80287e08 r7:eb2e5e60 r6:8550d700 r5:84c61800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d1fb0 to 0xeb2d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8551ac80 INFO: task kworker/0:604:4743 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: bf3bf000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb309e08 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854aef8c r4:854aec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8550d780 r8:80287e08 r7:eb2e5e60 r6:854fed00 r5:84e03c00 r4:8551ae40 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:606:4748 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:606 state:D stack:0 pid:4748 tgid:4748 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb311d84 r8:00000002 r7:60000113 r6:eb311d8c r5:84e01800 r4:84e01800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e01800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb311e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551a540 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e01800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eace3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854aeb8c r4:854ae800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854aeb8c r4:8550d800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e01800 r8:8550d82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8550d800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550d800 r8:80287e08 r7:eb309e60 r6:854fed80 r5:84e01800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb311fb0 to 0xeb311ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8551ae40 INFO: task kworker/0:606:4748 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: bf89c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r4:82ac21e4 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854af78c r4:854af400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8551ae80 INFO: task kworker/0:607:4749 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: bfa6c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:608:4751 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:608 state:D stack:0 pid:4751 tgid:4751 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2fdd84 r8:00000002 r7:60000113 r6:eb2fdd8c r5:84c60c00 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854af38c r4:854af000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8550d900 r8:80287e08 r7:eb315e60 r6:8550d980 r5:84c60c00 r4:8551a6c0 Call trace: Exception stack(0xe060dd28 to 0xe060dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 INFO: task kworker/0:609:4755 blocked for more than 460 seconds. r5:84c63c00 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85531280 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84c63c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eada7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854afb8c r4:854af800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854afb8c r4:8550da00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84c63c00 r8:8550da2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8550da00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550da00 r8:80287e08 r7:eb315e60 r6:8550da80 r5:84c63c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb319fb0 to 0xeb319ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855311c0 INFO: task kworker/0:609:4755 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: bfd8c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:610:4756 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:610 state:D stack:0 pid:4756 tgid:4756 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb329d84 r8:00000002 r7:60000013 r6:eb329d8c r5:84e04800 r4:84e04800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e04800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb329e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85531440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e04800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadc3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854aff8c r4:854afc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854aff8c r4:8550db00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e04800 r8:8550db2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8550db00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550db00 r8:80287e08 r7:eb319e60 r6:854fee80 r5:84e04800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb329fb0 to 0xeb329ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855311c0 INFO: task kworker/0:610:4756 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: bffa1000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:611:4758 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:611 state:D stack:0 pid:4758 tgid:4758 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb331d84 r8:00000002 r7:60000113 r6:eb331d8c r5:84e05400 r4:84e05400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e05400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb331e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85531b00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e05400 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf1d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b138c r4:854b1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b138c r4:8550db80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e05400 r8:8550dbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8550db80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550db80 r8:80287e08 r7:eb329e60 r6:854fef00 r5:84e05400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb331fb0 to 0xeb331ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855312c0 INFO: task kworker/0:611:4758 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c0340000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:612:4760 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:612 state:D stack:0 pid:4760 tgid:4760 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb335d84 r8:00000002 r7:60000113 r6:eb335d8c r5:84e06c00 r4:84e06c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e06c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb335e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85531580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e06c00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eade9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b038c r4:854b0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b038c r4:8550dc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e06c00 r8:8550dc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8550dc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550dc00 r8:80287e08 r7:eb331e60 r6:854fef80 r5:84e06c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb335fb0 to 0xeb335ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85531400 INFO: task kworker/0:612:4760 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c0340000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:613:4761 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:613 state:D stack:0 pid:4761 tgid:4761 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb339d84 r8:00000002 r7:60000113 r6:eb339d8c r5:85483c00 r4:85483c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85483c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb339e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85531780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85483c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae0f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b078c r4:854b0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b078c r4:8550dc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85483c00 r8:8550dcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8550dc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550dc80 r8:80287e08 r7:eb331e60 r6:8553b000 r5:85483c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb339fb0 to 0xeb339ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85531400 INFO: task kworker/0:613:4761 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c05af000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:614:4763 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:614 state:D stack:0 pid:4763 tgid:4763 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb341d84 r8:00000002 r7:60000113 r6:eb341d8c r5:85488c00 r4:85488c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85488c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb341e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85531880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85488c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae9f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b0b8c r4:854b0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b0b8c r4:8550dd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85488c00 r8:8550dd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8550dd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550dd00 r8:80287e08 r7:eb331e60 r6:8553b080 r5:85488c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb341fb0 to 0xeb341ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85531600 INFO: task kworker/0:614:4763 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c0898000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:615:4765 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:615 state:D stack:0 pid:4765 tgid:4765 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb325d84 r8:00000002 r7:60000113 r6:eb325d8c r5:8542d400 r4:8542d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8542d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb325e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85531a00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8542d400 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeb1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b0f8c r4:854b0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b0f8c r4:8550dd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8542d400 r8:8550ddac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8550dd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550dd80 r8:80287e08 r7:eb331e60 r6:8550de00 r5:8542d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb325fb0 to 0xeb325ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85531680 INFO: task kworker/0:615:4765 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c0898000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:616:4769 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:616 state:D stack:0 pid:4769 tgid:4769 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb345d84 r8:00000002 r7:60000113 r6:eb345d8c r5:84e06000 r4:84e06000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e06000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb345e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85531c40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e06000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b178c r4:854b1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b178c r4:8550de80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e06000 r8:8550deac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8550de80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550de80 r8:80287e08 r7:eb331e60 r6:8550df00 r5:84e06000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb345fb0 to 0xeb345ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85531900 INFO: task kworker/0:616:4769 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c09b4000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:617:4770 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:617 state:D stack:0 pid:4770 tgid:4770 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb13dd84 r8:00000002 r7:60000013 r6:eb13dd8c r5:84cf8000 r4:84cf8000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84cf8000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb13de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85542040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cf8000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc6f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b238c r4:854b2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b238c r4:8550df80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cf8000 r8:8550dfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8550df80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550df80 r8:80287e08 r7:eb345e60 r6:8553e000 r5:84cf8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb13dfb0 to 0xeb13dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85531900 INFO: task kworker/0:617:4770 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c0c3d000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:618:4771 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:618 state:D stack:0 pid:4771 tgid:4771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb34dd84 r8:00000002 r7:60000113 r6:eb34dd8c r5:84cf9800 r4:84cf9800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84cf9800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb34de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85531e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cf9800 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf67000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b1b8c r4:854b1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b1b8c r4:8553e080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cf9800 r8:8553e0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8553e080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553e080 r8:80287e08 r7:eb13de60 r6:8553e100 r5:84cf9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb34dfb0 to 0xeb34dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85531cc0 INFO: task kworker/0:618:4771 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c0e4c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:619:4773 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:619 state:D stack:0 pid:4773 tgid:4773 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb041d84 r8:00000002 r7:60000113 r6:eb041d8c r5:85489800 r4:85489800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85489800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb041e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85531f80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85489800 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa43000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b1f8c r4:854b1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b1f8c r4:8553e180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85489800 r8:8553e1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8553e180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553e180 r8:80287e08 r7:eb13de60 r6:8553b100 r5:85489800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb041fb0 to 0xeb041ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85531fc0 INFO: task kworker/0:619:4773 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c1019000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:620:4777 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:620 state:D stack:0 pid:4777 tgid:4777 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb155d84 r8:00000002 r7:60000013 r6:eb155d8c r5:85488000 r4:85488000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85488000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb155e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85542280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85488000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b278c r4:854b2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b278c r4:8553e200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85488000 r8:8553e22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8553e200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553e200 r8:80287e08 r7:eb13de60 r6:8553b180 r5:85488000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb155fb0 to 0xeb155ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855421c0 INFO: task kworker/0:620:4777 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c11d3000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:621:4778 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:621 state:D stack:0 pid:4778 tgid:4778 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb175d84 r8:00000002 r7:60000113 r6:eb175d8c r5:8548b000 r4:8548b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8548b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb175e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85542440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8548b000 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e007b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b2b8c r4:854b2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b2b8c r4:8553e280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8548b000 r8:8553e2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8553e280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553e280 r8:80287e08 r7:eb155e60 r6:8553b200 r5:8548b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb175fb0 to 0xeb175ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855421c0 INFO: task kworker/0:621:4778 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c145a000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:622:4779 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:622 state:D stack:0 pid:4779 tgid:4779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1bdd84 r8:00000002 r7:60000013 r6:eb1bdd8c r5:8548c800 r4:8548c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8548c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1bde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855429c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8548c800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48e7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b3b8c r4:854b3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b3b8c r4:8553e300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8548c800 r8:8553e32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8553e300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553e300 r8:80287e08 r7:eb175e60 r6:8553b280 r5:8548c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1bdfb0 to 0xeb1bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855421c0 INFO: task kworker/0:622:4779 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c162c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:623:4781 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:623 state:D stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1d5d84 r8:00000002 r7:60000013 r6:eb1d5d8c r5:8548bc00 r4:8548bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8548bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855425c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8548bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0609000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b2f8c r4:854b2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b2f8c r4:8553e380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8548bc00 r8:8553e3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8553e380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553e380 r8:80287e08 r7:eb1bde60 r6:8553b300 r5:8548bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1d5fb0 to 0xeb1d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855421c0 INFO: task kworker/0:623:4781 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c162c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:624:4783 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:624 state:D stack:0 pid:4783 tgid:4783 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1e9d84 r8:00000002 r7:60000113 r6:eb1e9d8c r5:8548d400 r4:8548d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8548d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855426c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8548d400 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07a9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b338c r4:854b3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b338c r4:8553e400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8548d400 r8:8553e42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8553e400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553e400 r8:80287e08 r7:eb1bde60 r6:8553b380 r5:8548d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e9fb0 to 0xeb1e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855423c0 INFO: task kworker/0:624:4783 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c17e4000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:625:4785 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:625 state:D stack:0 pid:4785 tgid:4785 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1f9d84 r8:00000002 r7:60000113 r6:eb1f9d8c r5:8548a400 r4:8548a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8548a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85542840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8548a400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e080d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b378c r4:854b3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b378c r4:8553e480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8548a400 r8:8553e4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8553e480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553e480 r8:80287e08 r7:eb1bde60 r6:8553b400 r5:8548a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1f9fb0 to 0xeb1f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855421c0 INFO: task kworker/0:625:4785 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c1963000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:626:4789 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:626 state:D stack:0 pid:4789 tgid:4789 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb351d84 r8:00000002 r7:60000113 r6:eb351d8c r5:8548ec00 r4:8548ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8548ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb351e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85542b00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8548ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e895d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b3f8c r4:854b3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b3f8c r4:8553e500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8548ec00 r8:8553e52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8553e500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553e500 r8:80287e08 r7:eb1bde60 r6:8553b480 r5:8548ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb351fb0 to 0xeb351ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855427c0 INFO: task kworker/0:626:4789 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c1b6d000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:627:4791 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:627 state:D stack:0 pid:4791 tgid:4791 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1fdd84 r8:00000002 r7:60000113 r6:eb1fdd8c r5:8548e000 r4:8548e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8548e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1fde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85542c40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8548e000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabc7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b838c r4:854b8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b838c r4:8553e580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8548e000 r8:8553e5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8553e580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553e580 r8:80287e08 r7:eb351e60 r6:8553b500 r5:8548e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1fdfb0 to 0xeb1fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85542980 INFO: task kworker/0:627:4791 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c1b6d000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:628:4793 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:628 state:D stack:0 pid:4793 tgid:4793 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb205d84 r8:00000002 r7:60000113 r6:eb205d8c r5:85588000 r4:85588000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85588000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb205e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85542d00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85588000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaccb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b878c r4:854b8400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b878c r4:8553e600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85588000 r8:8553e62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8553e600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553e600 r8:80287e08 r7:eb1fde60 r6:8553b580 r5:85588000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb205fb0 to 0xeb205ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85542ac0 INFO: task kworker/0:628:4793 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c2138000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:629:4794 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:629 state:D stack:0 pid:4794 tgid:4794 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb219d84 r8:00000002 r7:60000013 r6:eb219d8c r5:85588c00 r4:85588c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85588c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb219e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85542ec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85588c00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae21000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b8b8c r4:854b8800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b8b8c r4:8553e700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85588c00 r8:8553e72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8553e700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553e700 r8:80287e08 r7:eb205e60 r6:8553b600 r5:85588c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb219fb0 to 0xeb219ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85542d80 INFO: task kworker/0:629:4794 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c2345000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:630:4797 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:630 state:D stack:0 pid:4797 tgid:4797 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb21dd84 r8:00000002 r7:60000113 r6:eb21dd8c r5:85589800 r4:85589800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85589800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb21de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85542780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85589800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae59000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b8f8c r4:854b8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b8f8c r4:8553e680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85589800 r8:8553e6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8553e680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553e680 r8:80287e08 r7:eb219e60 r6:8553b680 r5:85589800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb21dfb0 to 0xeb21dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85542b80 INFO: task kworker/0:630:4797 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c2345000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:631:4799 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:631 state:D stack:0 pid:4799 tgid:4799 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb225d84 r8:00000002 r7:60000013 r6:eb225d8c r5:8558a400 r4:8558a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8558a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb225e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8554e040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8558a400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf8d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b938c r4:854b9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b938c r4:8553e780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8558a400 r8:8553e7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8553e780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553e780 r8:80287e08 r7:eb21de60 r6:8553b700 r5:8558a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb225fb0 to 0xeb225ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85542d80 INFO: task kworker/0:631:4799 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c2551000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:632:4801 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:632 state:D stack:0 pid:4801 tgid:4801 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb22dd84 r8:00000002 r7:60000013 r6:eb22dd8c r5:8558b000 r4:8558b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8558b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb22de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8553e800 r8:80287e08 r7:eb225e60 r6:8553b780 r5:8558b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb22dfb0 to 0xeb22dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8554e100 INFO: task kworker/0:632:4801 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c2960000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:633:4803 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:633 state:D stack:0 pid:4803 tgid:4803 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb239d84 r8:00000002 r7:60000013 r6:eb239d8c r5:8558bc00 r4:8558bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8558bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb239e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8554e340 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8558bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafa9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b978c r4:854b9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b978c r4:8553e880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8558bc00 r8:8553e8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8553e880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553e880 r8:80287e08 r7:eb22de60 r6:8553b800 r5:8558bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb239fb0 to 0xeb239ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8554e1c0 INFO: task kworker/0:633:4803 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd20: c2d32000 eca69000 00000001 80239b98 7f23f000 00000001 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:634:4805 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8554e600 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8558c800 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb079000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854b9f8c r4:854b9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854b9f8c r4:8553e900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8558c800 r8:8553e92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8553e900 r10:00000000 r9:8553e900 r8:80287e08 r7:eb22de60 r6:8553b880 r5:8558c800 Exception stack(0xe060dd28 to 0xe060dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8554e740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8558e000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ba38c r4:854ba000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ba38c r4:8553e980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8558e000 r8:8553e9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8553e980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553e980 r8:80287e08 r7:eb279e60 r6:8553ba00 r5:8558e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb289fb0 to 0xeb289ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8554e380 Workqueue: events bpf_prog_free_deferred [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:84d91880 r4:8506c000 r10:8291a684 r9:eb359d84 r8:00000002 r7:60000113 r6:eb359d8c r5:85590c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb359e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8554e840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85590c00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0f3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854ba78c r4:854ba400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854ba78c r4:8553ea00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85590c00 r8:8553ea2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8553ea00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553ea00 r8:80287e08 r7:eb289e60 r6:8553ba80 r5:85590c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb359fb0 to 0xeb359ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd20: c3320000 eca69000 00000001 80239b98 7f23f000 00000001 r4:84d91880 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bab8c r4:854ba800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854bab8c r4:8553ea80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85591800 r8:8553eaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8553ea80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553ea80 r8:80287e08 r7:eb359e60 r6:8553bb00 r5:85591800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb35dfb0 to 0xeb35dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84d91880 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85593000 r4:8291a680 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:80000013 r4:80239bb0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8506c000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:eb369d84 r8:00000002 r7:60000113 r6:eb369d8c r5:85590000 r4:85590000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85590000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb369e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8554eb40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85590000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb133000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854baf8c r4:854bac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854baf8c r4:8553eb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85590000 r8:8553ebac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8553eb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553eb80 r8:80287e08 r7:eb365e60 r6:8553bc00 r5:85590000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb369fb0 to 0xeb369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8554e900 INFO: task kworker/0:639:4816 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:00001000 r4:dfc25000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:640 state:D stack:0 pid:4819 tgid:4819 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb375d84 r8:00000002 r7:60000113 r6:eb375d8c r5:85592400 r4:85592400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd20: c40be000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:84d91880 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:641 state:D stack:0 pid:4820 tgid:4820 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bb78c r4:854bb400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:204 state:D stack:0 pid:4823 tgid:4823 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb065e08 r5:00001000 r4:eac05000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85595400 r8:8553bdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 Exception stack(0xe060dd28 to 0xe060dd70) dd20: c40be000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:642:4825 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:642 state:D stack:0 pid:4825 tgid:4825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb381d84 r8:00000002 r7:60000013 r6:eb381d8c r5:85596c00 r4:85596c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85596c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb381e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550f700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85596c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bc78c r4:854bc400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb381fb0 to 0xeb381ff8) Workqueue: events bpf_prog_free_deferred dd20: c43c5000 eca69000 00000001 80239b98 7f23f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8558ec00 r8:8553edac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8554ef80 INFO: task kworker/0:643:4827 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c43c5000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:644:4828 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:644 state:D stack:0 pid:4828 tgid:4828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb38dd84 r8:00000002 r7:60000113 r6:eb38dd8c r5:85596000 r4:85596000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bc38c r4:854bc000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c46fb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) r10:8291a684 r9:eb391d84 r8:00000002 r7:60000013 r6:eb391d8c r5:85594800 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfa0: 00000000 00000000 00000000 00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb275000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bd38c r4:854bd000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854bd38c r4:8553ef00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85598000 r8:8553ef2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8553ef00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553ef00 r8:80287e08 r7:eb391e60 r6:85562080 r5:85598000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb395fb0 to 0xeb395ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8555a100 INFO: task kworker/0:646:4833 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c4ac7000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r5:84fdf38c r4:84fdf000 dfa0: 00000000 00000000 00000000 00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85598c00 r8:8553efac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8553ef80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553ef80 r8:80287e08 r7:eb395e60 r6:85562100 r5:85598c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb399fb0 to 0xeb399ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8555a080 INFO: task kworker/0:647:4835 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c4fc5000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r5:00001000 r4:dfc25000 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:648 state:D stack:0 pid:4837 tgid:4837 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb39dd84 r8:00000002 r7:60000013 r6:eb39dd8c r5:85599800 r4:85599800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85599800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb39de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555a800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85599800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2d7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bdf8c r4:854bdc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854bdf8c r4:8555c000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85599800 r8:8555c02c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:8555c000 r8:80287e08 r7:eb395e60 r6:85562180 r5:85599800 r4:8555a080 r4:00000000 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84cfd400 r8:8555c0ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) INFO: task kworker/0:650:4841 blocked for more than 461 seconds. r4:84cfc800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb295e08 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555a6c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cfc800 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2bd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bdb8c r4:854bd800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854bdb8c r4:8555c180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cfc800 r8:8555c1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8555c180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8555c180 r8:80287e08 r7:eb39de60 r6:8555c200 r5:84cfc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb295fb0 to 0xeb295ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8555a540 INFO: task kworker/0:650:4841 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c525b000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:651:4842 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:651 state:D stack:0 pid:4842 tgid:4842 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ade08 r5:00001000 r4:eb3c4000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84cfe000 r8:8555c2ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c55b8000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:652:4846 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:652 state:D stack:0 pid:4846 tgid:4846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3a9d84 r8:00000002 r7:60000113 r6:eb3a9d8c r5:84cfec00 r4:84cfec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84cfec00 r4:8291a680 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb3db000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854beb8c r4:854be800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe060dd28 to 0xe060dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:653:4847 blocked for more than 462 seconds. r4:84cfb000 r4:00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854be78c r4:854be400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854be78c r4:8555c480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cfb000 r8:8555c4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8555c480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8555c480 r8:80287e08 r7:eb3a9e60 r6:8555c500 r5:84cfb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3cdfb0 to 0xeb3cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8555a940 INFO: task kworker/0:653:4847 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c592c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:654:4849 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eb3d9d84 r8:00000002 r7:60000113 r6:eb3d9d8c r5:84cfbc00 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bef8c r4:854bec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8555c580 r8:80287e08 r7:eb3a9e60 r6:8555c600 r5:84cfbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3d9fb0 to 0xeb3d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8555ac00 INFO: task kworker/0:654:4849 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c5b32000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:655:4851 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:655 state:D stack:0 pid:4851 tgid:4851 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3e5d84 r8:00000002 r7:60000113 r6:eb3e5d8c r5:84cfa400 r4:84cfa400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84cfa400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bf38c r4:854bf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8555c680 r4:00000001 INFO: task kworker/0:655:4851 is blocked on a mutex likely owned by task kworker/0:201:3787. dd60: 80230ad0 80239bb0 80000013 ffffffff r4:e060ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84d91880 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:656 state:D stack:0 pid:4853 tgid:4853 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3f1d84 r8:00000002 r7:60000113 r6:eb3f1d8c r5:84cf8c00 r4:84cf8c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84cf8c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556e040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84cf8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3ff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bf78c r4:854bf400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854bf78c r4:8555c780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84cf8c00 r8:8555c7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8555c780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8555c780 r8:80287e08 r7:eb3e5e60 r6:8555c800 r5:84cf8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f1fb0 to 0xeb3f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/0:656:4853 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c5ef2000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:8506c000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:84e50000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 r5:854bff8c r4:854bfc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84e50000 r8:8555c8ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:658:4856 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:658 state:D stack:0 pid:4856 tgid:4856 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3a5d84 r8:00000002 r7:60000013 r6:eb3a5d8c r5:84e50c00 r4:84e50c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e50c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556e300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e50c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa4f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854bfb8c r4:854bf800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854bfb8c r4:8555c980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e50c00 r8:8555c9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8555c980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8555c980 r8:80287e08 r7:eb3fde60 r6:8555ca00 r5:84e50c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3a5fb0 to 0xeb3a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8556e240 INFO: task kworker/0:658:4856 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c627b000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:84e51800 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:854c038c r4:854c0000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dd60: 80230ad0 80239bb0 80000013 ffffffff r5:00001000 r4:dfc25000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:660:4861 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:660 state:D stack:0 pid:4861 tgid:4861 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb301d84 r8:00000002 r7:60000113 r6:eb301d8c r5:84e52400 r4:84e52400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e52400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb301e08 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556e780 r5:854c078c r4:854c0400 r10:00000000 r9:8555cb80 r8:80287e08 r7:eb409e60 r6:8555cc00 r5:84e52400 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 Not tainted 6.15.0-rc7-syzkaller #0 r4:84e53000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e53000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb30de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556e900 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e53000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea987000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c0b8c r4:854c0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c0b8c r4:8555cc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e53000 r8:8555ccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8555cc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8555cc80 r8:80287e08 r7:eb301e60 r6:8555cd00 r5:84e53000 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 Not tainted 6.15.0-rc7-syzkaller #0 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb31de08 r5:854c0f8c r4:854c0c00 r7:dddced80 r6:83018000 r5:854c0f8c r4:8555cd80 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8556e700 INFO: task kworker/0:662:4865 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c686b000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Not tainted 6.15.0-rc7-syzkaller #0 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:664:4868 blocked for more than 462 seconds. r10:8291a684 r9:eb411d84 r8:00000002 r7:60000013 r6:eb411d8c r5:84e54800 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:854c1b8c r4:854c1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84e54800 r8:8555cfac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: c6c0c000 eca69000 00000001 80239b98 7f23f000 00000001 r4:e060ddc0 r5:00001000 r4:dfc25000 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:eb415d84 r8:00000002 r7:60000013 r6:eb415d8c r5:84e56c00 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:854c178c r4:854c1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85580080 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe060dd28 to 0xe060dd70) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:205:4873 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:205 state:D stack:0 pid:4873 tgid:4873 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb40dd84 r8:00000002 r7:60000113 r6:eb40dd8c r5:8559b000 r4:8559b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8559b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb40de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c2f8c r4:855c2c00 r10:61c88647 r9:8559b000 r8:855622ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Call trace: r5:80000013 r4:80239bb0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb419e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557c1c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8559bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead3b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c178c r4:855c1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855c178c r4:85562380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8559bc00 r8:855623ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85562380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85562380 r8:80287e08 r7:eb40de60 r6:85562400 r5:8559bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb419fb0 to 0xeb419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8555f940 INFO: task kworker/1:206:4875 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 Exception stack(0xe060dd28 to 0xe060dd70) r4:00000000 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:8506c000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb505000 r5:855c1b8c r4:855c1800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 dfa0: 00000000 00000000 00000000 00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85577040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8559d400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c1f8c r4:854c1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c1f8c r4:85580180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8559d400 r8:855801ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85580180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85580180 r8:80287e08 r7:eb411e60 r6:85562580 r5:8559d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb431fb0 to 0xeb431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe060dd28 to 0xe060dd70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r10:8291a684 r9:eb439d84 r8:00000002 r7:60000113 r6:eb439d8c r5:8559e000 r4:00000000 r5:854c338c r4:854c3000 r10:61c88647 r9:8559e000 r8:8558022c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85580200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85580200 r8:80287e08 r7:eb431e60 r6:85562600 r5:8559e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb439fb0 to 0xeb439ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85577200 INFO: task kworker/0:667:4882 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c7bc0000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe060dfb0 to 0xe060dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eae4d000 r5:854c238c r4:854c2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c238c r4:85580280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c7bc0000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfa0: 00000000 00000000 00000000 00000000 r10:8291a684 r9:eb445d84 r8:00000002 r7:60000013 r6:eb445d8c r5:855a0c00 r9:83018005 r8:855a0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 r5:854c278c r4:854c2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85580300 5fa0: 00000000 00000000 00000000 00000000 Call trace: dd20: c7bc0000 eca69000 00000001 80239b98 7f23f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) Not tainted 6.15.0-rc7-syzkaller #0 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb44de08 r5:854c2b8c r4:854c2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c2b8c r4:85580380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855a0000 r8:855803ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85580380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85580380 r8:80287e08 r7:eb439e60 r6:85562780 r5:855a0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb44dfb0 to 0xeb44dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855774c0 INFO: task kworker/0:670:4887 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c8273000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:671:4889 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:671 state:D stack:0 pid:4889 tgid:4889 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb455d84 r8:00000002 r7:60000113 r6:eb455d8c r5:855a1800 r4:855a1800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855a1800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb455e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85577740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf55000 r5:854c2f8c r4:854c2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c2f8c r4:85580400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855a1800 r8:8558042c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85580400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb455fb0 to 0xeb455ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85577380 INFO: task kworker/0:671:4889 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c8273000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:672:4892 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:672 state:D stack:0 pid:4892 tgid:4892 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb461d84 r8:00000002 r7:60000113 r6:eb461d8c r5:855a3000 r4:855a3000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855a3000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb461e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85577940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0f1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c378c r4:854c3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c378c r4:85580480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855a3000 r8:855804ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85580480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85580480 r8:80287e08 r7:eb439e60 r6:85562880 r5:855a3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb461fb0 to 0xeb461ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85577640 INFO: task kworker/0:672:4892 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c8993000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:673:4894 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:673 state:D stack:0 pid:4894 tgid:4894 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb469d84 r8:00000002 r7:60000113 r6:eb469d8c r5:855a4800 r4:855a4800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855a4800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb469e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85577e80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb485000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855fc78c r4:855fc400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855fc78c r4:85580500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855a4800 r8:8558052c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85580500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85580500 r8:80287e08 r7:eb461e60 r6:85562900 r5:855a4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb469fb0 to 0xeb469ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855776c0 INFO: task kworker/0:673:4894 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c8993000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:674:4895 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:674 state:D stack:0 pid:4895 tgid:4895 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb46dd84 r8:00000002 r7:60000013 r6:eb46dd8c r5:855a5400 r4:855a5400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855a5400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb46de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85577b00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb305000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c3b8c r4:854c3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c3b8c r4:85580580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855a5400 r8:855805ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85580580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85580580 r8:80287e08 r7:eb469e60 r6:85562980 r5:855a5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb46dfb0 to 0xeb46dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855776c0 INFO: task kworker/0:674:4895 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c8993000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:675:4897 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:675 state:D stack:0 pid:4897 tgid:4897 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb475d84 r8:00000002 r7:60000113 r6:eb475d8c r5:855a2400 r4:855a2400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855a2400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb475e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85577bc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb32d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:854c3f8c r4:854c3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854c3f8c r4:85580600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855a2400 r8:8558062c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85580600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85580600 r8:80287e08 r7:eb469e60 r6:85562a00 r5:855a2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb475fb0 to 0xeb475ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85577a80 INFO: task kworker/0:675:4897 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c8ec9000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:676:4899 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:676 state:D stack:0 pid:4899 tgid:4899 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb47dd84 r8:00000002 r7:60000013 r6:eb47dd8c r5:855a6c00 r4:855a6c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855a6c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb47de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85577d40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb349000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855fc38c r4:855fc000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855fc38c r4:85580680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855a6c00 r8:855806ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85580680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85580680 r8:80287e08 r7:eb469e60 r6:85562a80 r5:855a6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb47dfb0 to 0xeb47dff8) dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe060dfb0 to 0xe060dff8) INFO: task kworker/0:677:4901 blocked for more than 462 seconds. r4:85638000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb425e08 r5:00001000 r4:eb491000 r5:855fcb8c r4:855fc800 r7:dddced80 r6:83018000 r5:855fcb8c r4:85580700 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85577b40 INFO: task kworker/0:677:4901 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c962d000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:678:4904 blocked for more than 462 seconds. r10:8291a684 r9:eb495d84 r8:00000002 r7:60000113 r6:eb495d8c r5:85638c00 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855fcf8c r4:855fcc00 r7:dddced80 r6:83018000 r5:855fcf8c r4:85580800 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 dd20: c962d000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:679:4906 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:679 state:D stack:0 pid:4906 tgid:4906 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4b9d84 r8:00000002 r7:60000013 r6:eb4b9d8c r5:855a6000 r4:855a6000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855a6000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84771280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4a9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855fd38c r4:855fd000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855fd38c r4:85580900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855a6000 r8:8558092c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85580900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85580900 r8:80287e08 r7:eb495e60 r6:85562b00 r5:855a6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b9fb0 to 0xeb4b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847711c0 INFO: task kworker/0:679:4906 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad0 80239bb0 80000013 ffffffff r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r5:84fdf38c r4:84fdf000 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 dfa0: 00000000 00000000 00000000 00000000 r4:8506c000 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:8563a400 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84771700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8563a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4d1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855fdf8c r4:855fdc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855fdf8c r4:85580980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8563a400 r8:855809ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85580980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85580980 r8:80287e08 r7:eb4b9e60 r6:85580a00 r5:8563a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a1fb0 to 0xeb4a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84771100 INFO: task kworker/0:680:4908 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: c9f43000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:681:4909 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:8563b000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb429e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84771400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8563b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4b5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855fd78c r4:855fd400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855fd78c r4:85580a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8563b000 r8:85580aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85580a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85580a80 r8:80287e08 r7:eb4a1e60 r6:85580b00 r5:8563b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb429fb0 to 0xeb429ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84771100 INFO: task kworker/0:681:4909 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ca3c2000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:682:4912 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:682 state:D stack:0 pid:4912 tgid:4912 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4bdd84 r8:00000002 r7:60000013 r6:eb4bdd8c r5:8563bc00 r4:8563bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8563bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4bde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847715c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8563bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4c5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855fdb8c r4:855fd800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855fdb8c r4:85580b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8563bc00 r8:85580bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85580b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85580b80 r8:80287e08 r7:eb4a1e60 r6:85580c00 r5:8563bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4bdfb0 to 0xeb4bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84771440 INFO: task kworker/0:682:4912 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ca432000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:683:4914 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:683 state:D stack:0 pid:4914 tgid:4914 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4d5d84 r8:00000002 r7:60000113 r6:eb4d5d8c r5:8563c800 r4:8563c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8563c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84771840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8563c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4dd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855fe38c r4:855fe000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855fe38c r4:85580c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8563c800 r8:85580cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85580c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85580c80 r8:80287e08 r7:eb4a1e60 r6:85580d00 r5:8563c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d5fb0 to 0xeb4d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84771780 INFO: task kworker/0:683:4914 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ca432000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:684:4916 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:684 state:D stack:0 pid:4916 tgid:4916 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4f1d84 r8:00000002 r7:60000013 r6:eb4f1d8c r5:855a8000 r4:855a8000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855a8000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84771a00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4e9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855fe78c r4:855fe400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855fe78c r4:85580d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855a8000 r8:85580dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85580d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85580d80 r8:80287e08 r7:eb4d5e60 r6:85562b80 r5:855a8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f1fb0 to 0xeb4f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84771680 INFO: task kworker/0:684:4916 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: caa44000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:685:4918 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:685 state:D stack:0 pid:4918 tgid:4918 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb509d84 r8:00000002 r7:60000113 r6:eb509d8c r5:855a9800 r4:855a9800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855a9800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb509e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84771dc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb515000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855fef8c r4:855fec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855fef8c r4:85580e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855a9800 r8:85580e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85580e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85580e00 r8:80287e08 r7:eb4f1e60 r6:85562c00 r5:855a9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb509fb0 to 0xeb509ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84771880 INFO: task kworker/0:685:4918 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: caa44000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:686:4919 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:686 state:D stack:0 pid:4919 tgid:4919 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb50dd84 r8:00000002 r7:60000013 r6:eb50dd8c r5:855aa400 r4:855aa400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855aa400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb50de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84771b40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4f9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855feb8c r4:855fe800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855feb8c r4:85580e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855aa400 r8:85580eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85580e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85580e80 r8:80287e08 r7:eb509e60 r6:85562c80 r5:855aa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb50dfb0 to 0xeb50dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84771880 INFO: task kworker/0:686:4919 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: cab4f000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:687:4921 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:687 state:D stack:0 pid:4921 tgid:4921 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4fdd84 r8:00000002 r7:60000013 r6:eb4fdd8c r5:8563e000 r4:8563e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8563e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4fde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84771ac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8563e000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfca7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855ff78c r4:855ff400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855ff78c r4:85580f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8563e000 r8:85580f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85580f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85580f00 r8:80287e08 r7:eb509e60 r6:85580f80 r5:8563e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4fdfb0 to 0xeb4fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847719c0 INFO: task kworker/0:687:4921 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: caf56000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:208:4924 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:208 state:D stack:0 pid:4924 tgid:4924 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4e1d84 r8:00000002 r7:60000113 r6:eb4e1d8c r5:855ab000 r4:855ab000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855ab000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c94680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5af000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c278c r4:855c2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855c278c r4:85562d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ab000 r8:85562d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85562d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85562d00 r8:80287e08 r7:eb40de60 r6:85562d80 r5:855ab000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4e1fb0 to 0xeb4e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ca2240 INFO: task kworker/1:208:4924 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: cb2d0000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:688:4925 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:688 state:D stack:0 pid:4925 tgid:4925 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb521d84 r8:00000002 r7:60000013 r6:eb521d8c r5:855abc00 r4:855abc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855abc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb521e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84771f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa5b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855ff38c r4:855ff000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855ff38c r4:84e4f000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855abc00 r8:84e4f02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e4f000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e4f000 r8:80287e08 r7:eb4fde60 r6:85562e00 r5:855abc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb521fb0 to 0xeb521ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847719c0 INFO: task kworker/0:688:4925 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: cb748000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:689:4928 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:689 state:D stack:0 pid:4928 tgid:4928 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb095d84 r8:00000002 r7:60000113 r6:eb095d8c r5:855ac800 r4:855ac800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855ac800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb095e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557c840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855ac800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e000f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855ffb8c r4:855ff800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855ffb8c r4:84e4f080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ac800 r8:84e4f0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e4f080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e4f080 r8:80287e08 r7:eb4fde60 r6:85562e80 r5:855ac800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb095fb0 to 0xeb095ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84771ec0 INFO: task kworker/0:689:4928 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: cb867000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:690:4930 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:690 state:D stack:0 pid:4930 tgid:4930 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1ddd84 r8:00000002 r7:60000013 r6:eb1ddd8c r5:855ad400 r4:855ad400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855ad400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1dde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556ee40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05ad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855fff8c r4:855ffc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855fff8c r4:84e4f100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ad400 r8:84e4f12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e4f100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e4f100 r8:80287e08 r7:eb095e60 r6:85562f00 r5:855ad400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1ddfb0 to 0xeb1ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84771d00 INFO: task kworker/0:690:4930 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: cb867000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:691:4932 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:691 state:D stack:0 pid:4932 tgid:4932 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3d5d84 r8:00000002 r7:60000013 r6:eb3d5d8c r5:855ae000 r4:855ae000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855ae000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e8300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e083f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560478c r4:85604400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560478c r4:84e4f180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ae000 r8:84e4f1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e4f180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e4f180 r8:80287e08 r7:eb1dde60 r6:85562f80 r5:855ae000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3d5fb0 to 0xeb3d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84771fc0 INFO: task kworker/0:691:4932 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: cbf8a000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:692:4933 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:692 state:D stack:0 pid:4933 tgid:4933 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3e1d84 r8:00000002 r7:60000013 r6:eb3e1d8c r5:855aec00 r4:855aec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855aec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e8100 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07b9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560438c r4:85604000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560438c r4:84e4f200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855aec00 r8:84e4f22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e4f200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e4f200 r8:80287e08 r7:eb3d5e60 r6:84cbb000 r5:855aec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e1fb0 to 0xeb3e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8557cf80 INFO: task kworker/0:692:4933 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: cbf8a000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:693:4936 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:693 state:D stack:0 pid:4936 tgid:4936 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3edd84 r8:00000002 r7:60000113 r6:eb3edd8c r5:855a8c00 r4:855a8c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855a8c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ede08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e8580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab65000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85604f8c r4:85604c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85604f8c r4:84e4f280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855a8c00 r8:84e4f2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e4f280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e4f280 r8:80287e08 r7:eb3d5e60 r6:84cbb080 r5:855a8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3edfb0 to 0xeb3edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847e8040 INFO: task kworker/0:693:4936 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: cbf8a000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:694:4937 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:694 state:D stack:0 pid:4937 tgid:4937 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3f9d84 r8:00000002 r7:60000113 r6:eb3f9d8c r5:8559ec00 r4:8559ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8559ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e8440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8559ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48d4000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85604b8c r4:85604800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85604b8c r4:84e4f300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8559ec00 r8:84e4f32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e4f300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e4f300 r8:80287e08 r7:eb3ede60 r6:84cbb100 r5:8559ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f9fb0 to 0xeb3f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847e8340 INFO: task kworker/0:694:4937 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: cc384000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:695:4940 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:695 state:D stack:0 pid:4940 tgid:4940 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb405d84 r8:00000002 r7:60000013 r6:eb405d8c r5:855a3c00 r4:855a3c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855a3c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb405e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e8740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacb1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560538c r4:85605000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560538c r4:84e4f380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855a3c00 r8:84e4f3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e4f380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e4f380 r8:80287e08 r7:eb3ede60 r6:84cbb180 r5:855a3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb405fb0 to 0xeb405ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847e8340 INFO: task kworker/0:695:4940 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: cc610000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:696:4942 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:696 state:D stack:0 pid:4942 tgid:4942 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb525d84 r8:00000002 r7:60000013 r6:eb525d8c r5:855b0000 r4:855b0000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855b0000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb525e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e8b00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae61000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85605b8c r4:85605800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85605b8c r4:84e4f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855b0000 r8:84e4f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e4f400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e4f400 r8:80287e08 r7:eb405e60 r6:84e4f480 r5:855b0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb525fb0 to 0xeb525ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847e85c0 INFO: task kworker/0:696:4942 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: cc610000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:697:4944 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:697 state:D stack:0 pid:4944 tgid:4944 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb529d84 r8:00000002 r7:60000113 r6:eb529d8c r5:8563d400 r4:8563d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8563d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb529e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e8880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8563d400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae1f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560578c r4:85605400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560578c r4:84e4f500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8563d400 r8:84e4f52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e4f500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e4f500 r8:80287e08 r7:eb525e60 r6:84e4f580 r5:8563d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb529fb0 to 0xeb529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847e8700 INFO: task kworker/0:697:4944 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: cca31000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:698:4945 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:698 state:D stack:0 pid:4945 tgid:4945 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb52dd84 r8:00000002 r7:60000113 r6:eb52dd8c r5:8563ec00 r4:8563ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8563ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb52de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e8c40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8563ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf9b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85605f8c r4:85605c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85605f8c r4:84e4f680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8563ec00 r8:84e4f6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e4f680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e4f680 r8:80287e08 r7:eb525e60 r6:84e4f700 r5:8563ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb52dfb0 to 0xeb52dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847e8a40 INFO: task kworker/0:698:4945 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: cca31000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:699:4947 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:699 state:D stack:0 pid:4947 tgid:4947 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4c9d84 r8:00000002 r7:60000013 r6:eb4c9d8c r5:85639800 r4:85639800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85639800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e8cc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85639800 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb07d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560678c r4:85606400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560678c r4:84e4f600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85639800 r8:84e4f62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e4f600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e4f600 r8:80287e08 r7:eb52de60 r6:84e4f780 r5:85639800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4c9fb0 to 0xeb4c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847e8a40 INFO: task kworker/0:699:4947 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: cd092000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:700:4949 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:700 state:D stack:0 pid:4949 tgid:4949 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb535d84 r8:00000002 r7:60000013 r6:eb535d8c r5:85640c00 r4:85640c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85640c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb535e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e8f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85640c00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb055000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560638c r4:85606000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560638c r4:84e4f800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85640c00 r8:84e4f82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e4f800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e4f800 r8:80287e08 r7:eb4c9e60 r6:84e4f880 r5:85640c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb535fb0 to 0xeb535ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847e8a40 INFO: task kworker/0:700:4949 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: cd092000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:701:4952 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:701 state:D stack:0 pid:4952 tgid:4952 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb531d84 r8:00000002 r7:60000113 r6:eb531d8c r5:85640000 r4:85640000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85640000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb531e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca2f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85640000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c238c r4:855c2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855c238c r4:84e4f900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85640000 r8:84e4f92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e4f900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e4f900 r8:80287e08 r7:eb4c9e60 r6:84e4f980 r5:85640000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb531fb0 to 0xeb531ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847e8d80 INFO: task kworker/0:701:4952 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: cd49a000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:702:4955 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:702 state:D stack:0 pid:4955 tgid:4955 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb53dd84 r8:00000002 r7:60000013 r6:eb53dd8c r5:85641800 r4:85641800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85641800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb53de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e22100 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85641800 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb113000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85606b8c r4:85606800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85606b8c r4:84e4fa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85641800 r8:84e4fa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e4fa00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e4fa00 r8:80287e08 r7:eb531e60 r6:84e4fa80 r5:85641800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb53dfb0 to 0xeb53dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e22080 INFO: task kworker/0:702:4955 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: cd961000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:703:4957 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:703 state:D stack:0 pid:4957 tgid:4957 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb541d84 r8:00000002 r7:60000013 r6:eb541d8c r5:85642400 r4:85642400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85642400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb541e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e226c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85642400 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb19b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560778c r4:85607400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560778c r4:84e4fb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85642400 r8:84e4fb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e4fb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e4fb00 r8:80287e08 r7:eb53de60 r6:84e4fb80 r5:85642400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb541fb0 to 0xeb541ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e22080 INFO: task kworker/0:703:4957 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: cd961000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:704:4959 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:704 state:D stack:0 pid:4959 tgid:4959 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb545d84 r8:00000002 r7:60000113 r6:eb545d8c r5:85643000 r4:85643000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85643000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb545e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e22300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85643000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb12d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85606f8c r4:85606c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85606f8c r4:84e4fc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85643000 r8:84e4fc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e4fc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e4fc00 r8:80287e08 r7:eb541e60 r6:84e4fc80 r5:85643000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb545fb0 to 0xeb545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e22340 INFO: task kworker/0:704:4959 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: cdc50000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:705:4960 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:705 state:D stack:0 pid:4960 tgid:4960 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb539d84 r8:00000002 r7:60000113 r6:eb539d8c r5:85643c00 r4:85643c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85643c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb539e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e22480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85643c00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb15d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560738c r4:85607000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560738c r4:84e4fd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85643c00 r8:84e4fd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e4fd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e4fd00 r8:80287e08 r7:eb541e60 r6:84e4fd80 r5:85643c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb539fb0 to 0xeb539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e22340 INFO: task kworker/0:705:4960 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: cdf79000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:706:4963 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:706 state:D stack:0 pid:4963 tgid:4963 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb549d84 r8:00000002 r7:60000013 r6:eb549d8c r5:85644800 r4:85644800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85644800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb549e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e227c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85644800 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1b1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85607b8c r4:85607800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85607b8c r4:84e4fe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85644800 r8:84e4fe2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e4fe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e4fe00 r8:80287e08 r7:eb541e60 r6:84e4fe80 r5:85644800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb549fb0 to 0xeb549ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e22540 INFO: task kworker/0:706:4963 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: cdf79000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:707:4966 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:707 state:D stack:0 pid:4966 tgid:4966 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb551d84 r8:00000002 r7:60000113 r6:eb551d8c r5:85645400 r4:85645400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85645400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb551e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e22940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85645400 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1d9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85607f8c r4:85607c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85607f8c r4:84e4ff00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85645400 r8:84e4ff2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e4ff00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e4ff00 r8:80287e08 r7:eb549e60 r6:84e4ff80 r5:85645400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb551fb0 to 0xeb551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e22980 INFO: task kworker/0:707:4966 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ce39f000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:8506c000 r4:85646000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85646000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb201000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560838c r4:85608000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560838c r4:84f0b000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85646000 r8:84f0b02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f0b000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f0b000 r8:80287e08 r7:eb551e60 r6:84f0b080 r5:85646000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb555fb0 to 0xeb555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e22740 INFO: task kworker/0:708:4967 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ce9d0000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:709:4970 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:709 state:D stack:0 pid:4970 tgid:4970 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb559d84 r8:00000002 r7:60000113 r6:eb559d8c r5:85646c00 r4:85646c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85646c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb559e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e22c40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85646c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8560878c r4:85608400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560878c r4:84f0b100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85646c00 r8:84f0b12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f0b100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f0b100 r8:80287e08 r7:eb555e60 r6:84f0b180 r5:85646c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb559fb0 to 0xeb559ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e22840 INFO: task kworker/0:709:4970 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ce9d0000 eca69000 00000001 80239b98 7f23f000 00000001 dd60: 80230ad0 80239bb0 80000013 ffffffff r4:e060ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e56000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb55de08 r5:00001000 r4:eb2a5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560938c r4:85609000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560938c r4:84f0b200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e56000 r8:84f0b22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f0b200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f0b200 r8:80287e08 r7:eb559e60 r6:84f0b280 r5:84e56000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb55dfb0 to 0xeb55dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e22ac0 INFO: task kworker/0:710:4971 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: cee4a000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:711:4973 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:711 state:D stack:0 pid:4973 tgid:4973 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb561d84 r8:00000002 r7:60000113 r6:eb561d8c r5:84e78000 r4:84e78000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e78000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb561e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85608b8c r4:85608800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e22c80 INFO: task kworker/0:711:4973 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: cf11e000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:712 state:D stack:0 pid:4974 tgid:4974 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84e78c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb54de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85577f80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e78c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb271000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85608f8c r4:85608c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85608f8c r4:84f0b400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e78c00 r8:84f0b42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f0b400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f0b400 r8:80287e08 r7:eb55de60 r6:84f0b480 r5:84e78c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb54dfb0 to 0xeb54dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e22f80 INFO: task kworker/0:712:4974 is blocked on a mutex likely owned by task kworker/0:201:3787. Call trace: Exception stack(0xe060dd28 to 0xe060dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:713:4977 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:713 state:D stack:0 pid:4977 tgid:4977 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb565d84 r8:00000002 r7:60000113 r6:eb565d8c r5:84e79800 r4:84e79800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e79800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb565e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84783300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e79800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2e9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85609b8c r4:85609800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85609b8c r4:84f0b500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e79800 r8:84f0b52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f0b500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f0b500 r8:80287e08 r7:eb55de60 r6:84f0b580 r5:84e79800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb565fb0 to 0xeb565ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ca2e80 INFO: task kworker/0:713:4977 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:714:4979 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:714 state:D stack:0 pid:4979 tgid:4979 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84e7a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb56de08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8560978c r4:85609400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560978c r4:84f0b600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e7a400 r8:84f0b62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f0b600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f0b600 r8:80287e08 r7:eb565e60 r6:84f0b680 r5:84e7a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb56dfb0 to 0xeb56dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84783000 INFO: task kworker/0:714:4979 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: cf540000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:715:4982 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:715 state:D stack:0 pid:4982 tgid:4982 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:84e7c800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb569e08 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85609f8c r4:85609c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85609f8c r4:84f0b700 r10:61c88647 r9:84e7c800 r8:84f0b72c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe060dd28 to 0xe060dd70) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:716:4983 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:716 state:D stack:0 pid:4983 tgid:4983 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb575d84 r8:00000002 r7:60000013 r6:eb575d8c r5:84e7b000 r4:84e7b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e7b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb575e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84783900 r5:8560a78c r4:8560a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560a78c r4:84f0b800 r4:84f0b800 5fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb579e08 r5:8560a38c r4:8560a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84e7d400 r8:84f0b92c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84783240 INFO: task kworker/0:717:4984 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: cf9e2000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:718:4987 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8560ab8c r4:8560a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84e7e000 r8:84f0ba2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84783400 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:e060ddc0 r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560af8c r4:8560ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560af8c r4:84f0bb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e7bc00 r8:84f0bb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f0bb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f0bb00 r8:80287e08 r7:eb57de60 r6:84f0bb80 r5:84e7bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb581fb0 to 0xeb581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84783740 INFO: task kworker/0:719:4989 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: cfe8f000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:720:4991 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:720 state:D stack:0 pid:4991 tgid:4991 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85648c00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8560b78c r4:8560b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85648c00 r8:84f0bc2c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xe060dd28 to 0xe060dd70) dd20: d00eb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:721:4993 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:721 state:D stack:0 pid:4993 tgid:4993 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb571d84 r8:00000002 r7:60000113 r6:eb571d8c r5:8564a400 r4:8564a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8564a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb571e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84783f80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8564a400 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb58b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8560b38c r4:8560b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560b38c r4:84f0bd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8564a400 r8:84f0bd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f0bd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f0bd00 r8:80287e08 r7:eb589e60 r6:84f0bd80 r5:8564a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb571fb0 to 0xeb571ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84783e00 INFO: task kworker/0:721:4993 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 80000013 ffffffff r5:84fdf38c r4:84fdf000 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:722:4995 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:722 state:D stack:0 pid:4995 tgid:4995 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5a1d84 r8:00000002 r7:60000113 r6:eb5a1d8c r5:85648000 r4:85648000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85648000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842e42c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85648000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5a3000 r5:8560bb8c r4:8560b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84d91880 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85649800 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8560bf8c r4:8560bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84f0bf00 r8:80287e08 r7:eb5a1e60 r6:84f0bf80 r5:85649800 r4:00000000 r4:82ac21e4 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:724:5000 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:724 state:D stack:0 pid:5000 tgid:5000 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291a684 r9:eb5c5d84 r8:00000002 r7:60000113 r6:eb5c5d8c r5:8564c800 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8561878c r4:85618400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:725:5001 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:725 state:D stack:0 pid:5001 tgid:5001 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5b9d84 r8:00000002 r7:60000013 r6:eb5b9d8c r5:8564b000 r4:8564b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8564b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8561838c r4:85618000 r10:61c88647 r9:8564b000 r8:847ea12c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:84d91880 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d1e08 r5:00001000 r4:eb63b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c2b8c r4:855c2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855c2b8c r4:84cbb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8564bc00 r8:84cbb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cbb200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cbb200 r8:80287e08 r7:eb40de60 r6:847ea200 r5:8564bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c94500 INFO: task kworker/1:209:5003 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: d0ce9000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r4:8564ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8564ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842e4d40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8564ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5e3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85618b8c r4:85618800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85618b8c r4:847ea280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8564ec00 r8:847ea2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847ea280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ea280 r8:80287e08 r7:eb5c5e60 r6:847ea300 r5:8564ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e1fb0 to 0xeb5e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842e4740 INFO: task kworker/0:726:5005 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: d108a000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:727:5007 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:727 state:D stack:0 pid:5007 tgid:5007 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5edd84 r8:00000002 r7:60000013 r6:eb5edd8c r5:8564e000 r4:8564e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8564e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5ede08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:85618f8c r4:85618c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:84fdf38c r4:84fdf000 Exception stack(0xe060dfb0 to 0xe060dff8) r10:8291a684 r9:eb5f9d84 r8:00000002 r7:60000113 r6:eb5f9d8c r5:85650000 r5:00001000 r4:eb5fb000 r5:8561938c r4:85619000 r10:00000000 r9:847ea480 r8:80287e08 r7:eb5ede60 r6:847ea500 r5:85650000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842e4d80 INFO: task kworker/0:728:5009 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: d14ad000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) r10:8291a684 r9:eb605d84 r8:00000002 r7:60000013 r6:eb605d8c r5:85651800 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8561978c r4:85619400 r10:00000000 r9:847ea580 r8:80287e08 r7:eb5f9e60 r6:847ea600 r5:85651800 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 Workqueue: events bpf_prog_free_deferred [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85619b8c r4:85619800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855b0c00 r8:847ea6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847ea680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ea680 r8:80287e08 r7:eb605e60 r6:84cbb280 r5:855b0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb59dfb0 to 0xeb59dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c95040 INFO: task kworker/0:730:5013 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: d180c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84d91880 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:85619f8c r4:85619c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855b2400 r8:847ea72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847ea700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ea700 r8:80287e08 r7:eb59de60 r6:84cbb300 r5:855b2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 Call trace: [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8561a38c r4:8561a000 r7:dddced80 r6:83018000 r5:8561a38c r4:847ea780 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 INFO: task kworker/0:733:5019 blocked for more than 464 seconds. r4:00000000 r9:83018005 r8:855b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 r5:8561a78c r4:8561a400 r10:61c88647 r9:855b3c00 r8:847ea82c r7:82804d40 r6:dddced80 r5:dddceda0 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:734:5021 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:734 state:D stack:0 pid:5021 tgid:5021 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5ddd84 r8:00000002 r7:60000113 r6:eb5ddd8c r5:855b4800 r4:855b4800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855b4800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5dde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c95b80 r5:8561af8c r4:8561ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8561af8c r4:847ea880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855b4800 r8:847ea8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847ea880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ea880 r8:80287e08 r7:eb631e60 r6:84cbb480 r5:855b4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5ddfb0 to 0xeb5ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c950c0 INFO: task kworker/0:734:5021 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r4:00000000 r5:84fdf38c r4:84fdf000 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:eb645d84 r8:00000002 r7:60000013 r6:eb645d8c r5:855b5400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb645e08 r9:83018205 r8:855b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 r5:84059f8c r4:84059c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:855b5400 r8:84cbb52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80000013 ffffffff r4:e060ddc0 r4:00000000 r5:00001000 r4:dfc25000 r4:84d91880 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:eb655d84 r8:00000002 r7:60000013 r6:eb655d8c r5:855b6000 r5:855b6000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb655e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e3c500 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe5d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855c3f8c r4:855c3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855c3f8c r4:84cbb600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855b6000 r8:84cbb62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cbb600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cbb600 r8:80287e08 r7:eb645e60 r6:84cbb680 r5:855b6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb655fb0 to 0xeb655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c94a00 INFO: task kworker/1:211:5025 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: d2332000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8561ab8c r4:8561a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:847ea900 r8:80287e08 r7:eb5dde60 r6:84cbb700 r5:855b6c00 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: d2736000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:736:5029 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:736 state:D stack:0 pid:5029 tgid:5029 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb671d84 r8:00000002 r7:60000113 r6:eb671d8c r5:855b1800 r4:855b1800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855b1800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb671e08 r4:00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8561b78c r4:8561b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8561b78c r4:847ea980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe060dd28 to 0xe060dd70) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:737:5030 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:737 state:D stack:0 pid:5030 tgid:5030 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb67dd84 r8:00000002 r7:60000113 r6:eb67dd8c r5:855b8000 r4:855b8000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855b8000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb67de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c95dc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:8561b38c r4:8561b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8561b38c r4:847eaa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe060dd28 to 0xe060dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r5:84fdf38c r4:84fdf000 r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:855b8c00 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:855c338c r4:855c3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:855b8c00 r8:847eaaac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855b9800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb695e08 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c957c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855b9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0db000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb68b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8561bb8c r4:8561b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8561bb8c r4:847eab00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855b9800 r8:847eab2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847eab00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847eab00 r8:80287e08 r7:eb689e60 r6:84cbb900 r5:855b9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb695fb0 to 0xeb695ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c95f40 INFO: task kworker/0:739:5034 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: d2f28000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:740:5037 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:740 state:D stack:0 pid:5037 tgid:5037 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6a9d84 r8:00000002 r7:60000113 r6:eb6a9d8c r5:855ba400 r4:855ba400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855ba400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c90f80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0793000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85622b8c r4:85622800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85622b8c r4:847eab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ba400 r8:847eabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847eab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847eab80 r8:80287e08 r7:eb689e60 r6:84cbb980 r5:855ba400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a9fb0 to 0xeb6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c95640 INFO: task kworker/0:740:5037 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: d3595000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:741:5039 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:855bb000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b5e08 r5:00001000 r4:eb6ab000 r5:8561bf8c r4:8561bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8561bf8c r4:847eac00 r10:61c88647 r9:855bb000 r8:847eac2c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:212:5043 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:212 state:D stack:0 pid:5043 tgid:5043 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e3c800 r5:84059b8c r4:84059800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84059b8c r4:84cbba80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84e3c540 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:213:5046 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:213 state:D stack:0 pid:5046 tgid:5046 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb651d84 r8:00000002 r7:60000113 r6:eb651d8c r5:855be000 r4:855be000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855be000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb651e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e3cbc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855be000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa91000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8405978c r4:84059400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred r4:82ac21e4 r5:00001000 r4:dfc25000 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:742:5048 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:855bec00 r4:00000000 r5:8562038c r4:85620000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: d4187000 eca69000 00000001 80239b98 7f23f000 00000001 r4:e060ddc0 r5:00001000 r4:dfc25000 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:eb471d84 r8:00000002 r7:60000113 r6:eb471d8c r5:855bd400 r4:00000000 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:855e378c r4:855e3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855e378c r4:847ead00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855bd400 r8:847ead2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847ead00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ead00 r8:80287e08 r7:eb459e60 r6:84cbbd00 r5:855bd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb471fb0 to 0xeb471ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e382c0 INFO: task kworker/0:743:5049 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: d4497000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:855e038c r4:855e0000 r10:00000000 r9:84cbbd80 r8:80287e08 r7:eb651e60 r6:84cbbe00 r5:84f20c00 Exception stack(0xe060dd28 to 0xe060dd70) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:744:5052 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:744 state:D stack:0 pid:5052 tgid:5052 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb435d84 r8:00000002 r7:60000113 r6:eb435d8c r5:85650c00 r4:85650c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85650c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb435e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e38e00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85650c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb33b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85620b8c r4:85620800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85620b8c r4:847ead80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85650c00 r8:847eadac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847ead80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ead80 r8:80287e08 r7:eb471e60 r6:847eae00 r5:85650c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb435fb0 to 0xeb435ff8) 5fa0: 00000000 00000000 00000000 00000000 r4:84e382c0 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:8506c000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:855e078c r4:855e0400 r7:ddde2d80 r6:83018200 r5:855e078c r4:84cbbe80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r4:00000000 r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:216:5056 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:216 state:D stack:0 pid:5056 tgid:5056 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6bdd84 r8:00000002 r7:60000113 r6:eb6bdd8c r5:85653000 r4:85653000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85653000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6bde08 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:855e0b8c r4:855e0800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:217:5058 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:217 state:D stack:0 pid:5058 tgid:5058 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6c1d84 r8:00000002 r7:60000013 r6:eb6c1d8c r5:85655400 r4:85655400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85655400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c94480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85655400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e0f8c r4:855e0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e0f8c r4:84cbbf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85655400 r8:84cbbfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cbbf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cbbf80 r8:80287e08 r7:eb6bde60 r6:847eaf80 r5:85655400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c1fb0 to 0xeb6c1ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:e060ddc0 r4:00000000 r5:00001000 r4:dfc25000 r5:84fdf38c r4:84fdf000 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:218 state:D stack:0 pid:5060 tgid:5060 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6c5d84 r8:00000002 r7:60000013 r6:eb6c5d8c r5:85656000 r4:85656000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85656000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842e6040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85656000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e138c r4:855e1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e138c r4:84cad000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85656000 r8:84cad02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cad000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cad000 r8:80287e08 r7:eb6c1e60 r6:84ccd000 r5:85656000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c5fb0 to 0xeb6c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842e6080 INFO: task kworker/1:218:5060 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: d5365000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) INFO: task kworker/1:219:5062 blocked for more than 465 seconds. [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8562078c r4:85620400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb48dfb0 to 0xeb48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842e6080 INFO: task kworker/1:219:5062 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: d5716000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:220:5064 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:220 state:D stack:0 pid:5064 tgid:5064 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6c9d84 r8:00000002 r7:60000113 r6:eb6c9d8c r5:84f23c00 r4:84f23c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84f23c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:855e178c r4:855e1400 r7:ddde2d80 r6:83018200 r5:855e178c r4:84cad180 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 INFO: task kworker/1:221:5067 blocked for more than 465 seconds. [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842e6600 r5:855e1b8c r4:855e1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84f21800 r8:84cad2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:842e6380 INFO: task kworker/1:221:5067 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: d5ea5000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) INFO: task kworker/1:222:5068 blocked for more than 465 seconds. [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:855e1f8c r4:855e1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e1f8c r4:84cad380 r10:61c88647 r9:84f24800 r8:84cad3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 r5:84fdf38c r4:84fdf000 r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) task:kworker/1:223 state:D stack:0 pid:5070 tgid:5070 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842e6a40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f26000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb303000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e238c r4:855e2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e238c r4:84cad480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f26000 r8:84cad4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cad480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cad480 r8:80287e08 r7:eb6cde60 r6:84cad500 r5:84f26000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d5fb0 to 0xeb6d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842e65c0 INFO: task kworker/1:223:5070 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: d6690000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:224:5072 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842e6980 r5:855e278c r4:855e2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e278c r4:84cad580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f22400 r8:84cad5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cad580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cad580 r8:80287e08 r7:eb6d5e60 r6:84cad600 r5:84f22400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d9fb0 to 0xeb6d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842e68c0 INFO: task kworker/1:224:5072 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: d6838000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) r4:8506c000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6e1d84 r8:00000002 r7:60000113 r6:eb6e1d8c r5:84f20000 r4:84f20000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84f20000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e38f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f20000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb41d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85620f8c r4:85620c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85620f8c r4:84ccd080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f20000 r8:84ccd0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ccd080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ccd080 r8:80287e08 r7:eb471e60 r6:84cad700 r5:84f20000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6e1fb0 to 0xeb6e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e38c80 INFO: task kworker/0:745:5073 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfa0: 00000000 00000000 00000000 00000000 r10:8291a684 r9:eb6e5d84 r8:00000002 r7:60000113 r6:eb6e5d8c r5:84f26c00 r4:84f26c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84f26c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e3c680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f26c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb45d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e2b8c r4:855e2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e2b8c r4:84cad680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f26c00 r8:84cad6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cad680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cad680 r8:80287e08 r7:eb6d9e60 r6:84cad780 r5:84f26c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6e5fb0 to 0xeb6e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842e68c0 INFO: task kworker/1:225:5074 is blocked on a mutex likely owned by task kworker/0:201:3787. Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:746:5077 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:746 state:D stack:0 pid:5077 tgid:5077 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6edd84 r8:00000002 r7:60000113 r6:eb6edd8c r5:84f28000 r4:84f28000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84f28000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6ede08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e38a80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f28000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb479000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8562138c r4:85621000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562138c r4:84ccd100 r10:61c88647 r9:84f28000 r8:84ccd12c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r5:80000013 r4:80239bb0 r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84f29800 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 r5:855e338c r4:855e3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84cad880 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6f1fb0 to 0xeb6f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e3c740 INFO: task kworker/1:226:5079 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: d75b0000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 INFO: task kworker/1:227:5081 blocked for more than 465 seconds. r5:84f28c00 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e25040 r5:855e2f8c r4:855e2c00 r10:61c88647 r9:84f28c00 r8:84cad9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:842e6f80 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 dfa0: 00000000 00000000 00000000 00000000 r5:85652400 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e25740 r9:83018205 r8:85652400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4e5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855ec38c r4:855ec000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855ec38c r4:84cada80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85652400 r8:84cadaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cada80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cada80 r8:80287e08 r7:eb6f1e60 r6:84ccd180 r5:85652400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6f9fb0 to 0xeb6f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e25100 INFO: task kworker/1:228:5085 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: d77d8000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e3b8c r4:855e3800 r7:ddde2d80 r6:83018200 r5:855e3b8c r4:84cadb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84e25100 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: d7f47000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:747:5088 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eb701d84 r8:00000002 r7:60000113 r6:eb701d8c r5:85656c00 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85621b8c r4:85621800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85621b8c r4:84ccd280 r10:61c88647 r9:85656c00 r8:84ccd2ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562178c r4:85621400 r10:61c88647 r9:8564d400 r8:84ccd3ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:230:5091 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:230 state:D stack:0 pid:5091 tgid:5091 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb70dd84 r8:00000002 r7:60000013 r6:eb70dd8c r5:85670c00 r4:85670c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85670c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb70de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e256c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85670c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4d7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855e3f8c r4:855e3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855e3f8c r4:84cadc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85670c00 r8:84cadc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cadc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cadc00 r8:80287e08 r7:eb6f9e60 r6:84ccd480 r5:85670c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb70dfb0 to 0xeb70dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e25380 INFO: task kworker/1:230:5091 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: d876c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:e060ddc0 r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r4:84d91880 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85670000 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855edb8c r4:855ed800 r10:61c88647 r9:85670000 r8:84cadcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:232:5095 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:232 state:D stack:0 pid:5095 tgid:5095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb71dd84 r8:00000002 r7:60000113 r6:eb71dd8c r5:85671800 r4:85671800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85671800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb71de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e25900 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85671800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4f3000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855ec78c r4:855ec400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84cadd00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd20: d8b7d000 eca69000 00000001 80239b98 7f23f000 00000001 r4:e060ddc0 r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r4:84d91880 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:eb725d84 r8:00000002 r7:60000113 r6:eb725d8c r5:85672400 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855ecb8c r4:855ec800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855ecb8c r4:84cadd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85672400 r8:84caddac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84cadd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cadd80 r8:80287e08 r7:eb715e60 r6:84ccd600 r5:85672400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb725fb0 to 0xeb725ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e25700 INFO: task kworker/1:233:5097 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: d8d15000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:234:5099 blocked for more than 465 seconds. r5:85673c00 r4:8291a680 r4:00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:855ecf8c r4:855ecc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855ecf8c r4:84cade00 r4:84cade00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xe060dd28 to 0xe060dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:dfa7f000 r5:85621f8c r4:85621c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85621f8c r4:84ccd700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85674800 r8:84ccd72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ccd700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ccd700 r8:80287e08 r7:eb701e60 r6:84ccd780 r5:85674800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d1fb0 to 0xeb6d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c90840 INFO: task kworker/0:749:5102 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: d8edd000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:750:5103 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:750 state:D stack:0 pid:5103 tgid:5103 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb721d84 r8:00000002 r7:60000113 r6:eb721d8c r5:85675400 r4:85675400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85675400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb721e08 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8562238c r4:85622000 r10:61c88647 r9:85675400 r8:84ccd82c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:751:5107 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:751 state:D stack:0 pid:5107 tgid:5107 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5a9d84 r8:00000002 r7:60000013 r6:eb5a9d8c r5:85676c00 r4:85676c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85676c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c90d80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85676c00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04ff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562278c r4:85622400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562278c r4:84ccd900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85676c00 r8:84ccd92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ccd900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ccd900 r8:80287e08 r7:eb6a9e60 r6:84ccd980 r5:85676c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5a9fb0 to 0xeb5a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c90c00 INFO: task kworker/0:751:5107 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: d95d5000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb599d84 r8:00000002 r7:60000013 r6:eb599d8c r5:85676000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb599e08 r9:83018005 r8:85676000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 r5:8562338c r4:85623000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562338c r4:84ccda00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85676000 r8:84ccda2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ccda00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ccda00 r8:80287e08 r7:eb6a9e60 r6:84ccda80 r5:85676000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb599fb0 to 0xeb599ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c90c40 INFO: task kworker/0:752:5109 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: d95d5000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:753:5110 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:753 state:D stack:0 pid:5110 tgid:5110 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85622f8c r4:85622c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r4:84c90500 INFO: task kworker/0:753:5110 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xe060dd28 to 0xe060dd70) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r4:00000001 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e26400 r5:85623b8c r4:85623800 r7:dddced80 r6:83018000 r5:85623b8c r4:84ccdc00 r4:84c94080 dd20: d9ca2000 eca69000 00000001 80239b98 7f23f000 00000001 r5:84fdf38c r4:84fdf000 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:755:5115 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:755 state:D stack:0 pid:5115 tgid:5115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5d9d84 r8:00000002 r7:60000113 r6:eb5d9d8c r5:84ec2400 r4:84ec2400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ec2400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e26040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ec2400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae3b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8562378c r4:85623400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562378c r4:84ccdd00 r4:00000001 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80000013 ffffffff r5:00001000 r4:dfc25000 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb073000 r5:855ed38c r4:855ed000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84e25cc0 r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:756:5119 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:756 state:D stack:0 pid:5119 tgid:5119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5e9d84 r8:00000002 r7:60000113 r6:eb5e9d8c r5:84f2c800 r4:84f2c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84f2c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e26540 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f2c800 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafc9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85623f8c r4:85623c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85623f8c r4:84ccde00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f2c800 r8:84ccde2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84ccde00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ccde00 r8:80287e08 r7:eb5cde60 r6:84cadf80 r5:84f2c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e9fb0 to 0xeb5e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e26480 INFO: task kworker/0:756:5119 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:84fdf38c r4:84fdf000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r9:83018005 r8:84ec3000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 r5:8563038c r4:85630000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: da296000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:758:5123 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:758 state:D stack:0 pid:5123 tgid:5123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb615d84 r8:00000002 r7:60000113 r6:eb615d8c r5:84ec0c00 r4:84ec0c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ec0c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb615e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e26840 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:855c378c r4:855c3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84ec0c00 r8:84ccdfac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 r5:855ed78c r4:855ed400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84e25f00 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:759:5126 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:759 state:D stack:0 pid:5126 tgid:5126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb621d84 r8:00000002 r7:60000113 r6:eb621d8c r5:84f2e000 r4:84f2e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84f2e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e26b00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8563078c r4:85630400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8563078c r4:843ff080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f2e000 r8:843ff0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:843ff080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843ff080 r8:80287e08 r7:eb5f5e60 r6:84d77080 r5:84f2e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb621fb0 to 0xeb621ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e26940 INFO: task kworker/0:759:5126 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 dd20: daa57000 eca69000 00000001 80239b98 7f23f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) INFO: task kworker/0:760:5130 blocked for more than 466 seconds. r4:84ec3c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb601e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:843ff100 r8:80287e08 r7:eb621e60 r6:843ff180 r5:84ec3c00 Workqueue: events bpf_prog_free_deferred Exception stack(0xe060dd28 to 0xe060dd70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:761:5131 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:761 state:D stack:0 pid:5131 tgid:5131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb641d84 r8:00000002 r7:60000113 r6:eb641d8c r5:84ec4800 r4:84ec4800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ec4800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb1af000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb64dd84 r8:00000002 r7:60000113 r6:eb64dd8c r5:84ec5400 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e26f80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd20: dae1b000 eca69000 00000001 80239b98 7f23f000 00000001 r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:763:5135 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:763 state:D stack:0 pid:5135 tgid:5135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb669d84 r8:00000002 r7:60000113 r6:eb669d8c r5:84ec6000 r4:84ec6000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ec6000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb669e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f08300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ec6000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb285000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85631f8c r4:85631c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85631f8c r4:843ff400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ec6000 r8:843ff42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:843ff400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843ff400 r8:80287e08 r7:eb64de60 r6:843ff480 r5:84ec6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb669fb0 to 0xeb669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e26e00 INFO: task kworker/0:763:5135 is blocked on a mutex likely owned by task kworker/0:201:3787. Call trace: r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:764:5137 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:764 state:D stack:0 pid:5137 tgid:5137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb679d84 r8:00000002 r7:60000013 r6:eb679d8c r5:84ec6c00 r4:84ec6c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ec6c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb679e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:82ac21e4 r5:00001000 r4:dfc25000 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:765:5138 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:765 state:D stack:0 pid:5138 tgid:5138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:84ec1800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb685e08 r5:00001000 r4:eb24d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 Exception stack(0xeb685fb0 to 0xeb685ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f08000 INFO: task kworker/0:765:5138 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: db5a7000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:766 state:D stack:0 pid:5141 tgid:5141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb691d84 r8:00000002 r7:60000013 r6:eb691d8c r5:85673000 r4:85673000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85673000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb691e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f08640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85673000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2e7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8563278c r4:85632400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8563278c r4:843ff700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd20: db5a7000 eca69000 00000001 80239b98 7f23f000 00000001 r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:767:5143 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:767 state:D stack:0 pid:5143 tgid:5143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6a5d84 r8:00000002 r7:60000013 r6:eb6a5d8c r5:85660000 r4:85660000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85660000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a5e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8563238c r4:85632000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8563238c r4:843ff800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85660000 r8:843ff82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:843ff800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843ff800 r8:80287e08 r7:eb691e60 r6:843ff880 r5:85660000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a5fb0 to 0xeb6a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f083c0 INFO: task kworker/0:767:5143 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:84d91880 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:768 state:D stack:0 pid:5145 tgid:5145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6b1d84 r8:00000002 r7:60000013 r6:eb6b1d8c r5:85660c00 r4:85660c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85660c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f08740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85660c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb36b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85632b8c r4:85632800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85632b8c r4:843ff900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85660c00 r8:843ff92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:843ff900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843ff900 r8:80287e08 r7:eb691e60 r6:843ff980 r5:85660c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6b1fb0 to 0xeb6b1ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd20: dbc1b000 eca69000 00000001 80239b98 7f23f000 00000001 r4:00000000 r5:84fdf38c r4:84fdf000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:769:5147 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:769 state:D stack:0 pid:5147 tgid:5147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb735d84 r8:00000002 r7:60000113 r6:eb735d8c r5:85661800 r4:85661800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85661800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb735e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f08c40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85661800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb51d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8563378c r4:85633400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8563378c r4:843ffa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85661800 r8:843ffa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:843ffa00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843ffa00 r8:80287e08 r7:eb6b1e60 r6:843ffa80 r5:85661800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb735fb0 to 0xeb735ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f08880 INFO: task kworker/0:769:5147 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: dc05f000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:770:5148 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:770 state:D stack:0 pid:5148 tgid:5148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb739d84 r8:00000002 r7:60000113 r6:eb739d8c r5:85662400 r4:85662400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85662400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb739e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f08880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85632f8c r4:85632c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/0:771:5150 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:771 state:D stack:0 pid:5150 tgid:5150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb62dd84 r8:00000002 r7:60000113 r6:eb62dd8c r5:85663000 r4:85663000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85663000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb62de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f08b00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85663000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3ca000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8563338c r4:85633000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8563338c r4:843ffc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85663000 r8:843ffc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:843ffc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843ffc00 r8:80287e08 r7:eb735e60 r6:843ffc80 r5:85663000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb62dfb0 to 0xeb62dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f08700 INFO: task kworker/0:771:5150 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfc25000 r4:84d91880 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:772:5153 blocked for more than 466 seconds. r10:8291a684 r9:eb73dd84 r8:00000002 r7:60000113 r6:eb73dd8c r5:85663c00 r4:85663c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85663c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb73de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca5580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85663c00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb68d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a0f8c r4:856a0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856a0f8c r4:843ffd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85663c00 r8:843ffd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:843ffd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:843ffd00 r8:80287e08 r7:eb735e60 r6:843ffd80 r5:85663c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb73dfb0 to 0xeb73dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f08b40 INFO: task kworker/0:772:5153 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: dc983000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:773:5154 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:773 state:D stack:0 pid:5154 tgid:5154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:eb741d84 r8:00000002 r7:60000113 r6:eb741d8c r5:85664800 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85633b8c r4:85633800 r7:dddced80 r6:83018000 r5:85633b8c r4:843ffe00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: dccee000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:774:5157 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:774 state:D stack:0 pid:5157 tgid:5157 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85633f8c r4:85633c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: dccee000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:237:5159 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:237 state:D stack:0 pid:5159 tgid:5159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb749d84 r8:00000002 r7:60000113 r6:eb749d8c r5:84f2ec00 r4:84f2ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84f2ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb749e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f045c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f2ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacdb000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855eff8c r4:855efc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855eff8c r4:84d77100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f2ec00 r8:84d7712c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d77100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c92980 INFO: task kworker/1:237:5159 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: dd197000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:238:5160 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:238 state:D stack:0 pid:5160 tgid:5160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb745d84 r8:00000002 r7:60000113 r6:eb745d8c r5:84f2b000 r4:84f2b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84f2b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb745e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cab600 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84f2b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7eb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855edf8c r4:855edc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855edf8c r4:84d77200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f2b000 r8:84d7722c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d77200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d77200 r8:80287e08 r7:eb749e60 r6:84d77280 r5:84f2b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb745fb0 to 0xeb745ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c92980 INFO: task kworker/1:238:5160 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: dd418000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:775:5162 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:775 state:D stack:0 pid:5162 tgid:5162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb755d84 r8:00000002 r7:60000113 r6:eb755d8c r5:84f2a400 r4:84f2a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84f2a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb755e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca5140 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f2a400 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb629000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a038c r4:856a0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856a038c r4:84cb6000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f2a400 r8:84cb602c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cb6000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cb6000 r8:80287e08 r7:eb73de60 r6:84d77300 r5:84f2a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb755fb0 to 0xeb755ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c90140 INFO: task kworker/0:775:5162 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: dd5fa000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:776:5165 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:776 state:D stack:0 pid:5165 tgid:5165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb759d84 r8:00000002 r7:60000013 r6:eb759d8c r5:855bbc00 r4:855bbc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855bbc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb759e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca5300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855bbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb63d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a078c r4:856a0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856a078c r4:84cb6080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855bbc00 r8:84cb60ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cb6080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cb6080 r8:80287e08 r7:eb73de60 r6:84d77380 r5:855bbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb759fb0 to 0xeb759ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ca5200 INFO: task kworker/0:776:5165 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: dd980000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:777:5167 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:777 state:D stack:0 pid:5167 tgid:5167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb75dd84 r8:00000002 r7:60000113 r6:eb75dd8c r5:84f25400 r4:84f25400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84f25400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb75de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca5440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84f25400 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb661000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a0b8c r4:856a0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856a0b8c r4:84cb6100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84f25400 r8:84cb612c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cb6100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cb6100 r8:80287e08 r7:eb73de60 r6:84d77400 r5:84f25400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb75dfb0 to 0xeb75dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ca5200 INFO: task kworker/0:777:5167 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ddaa5000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:778:5169 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:778 state:D stack:0 pid:5169 tgid:5169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb74dd84 r8:00000002 r7:60000113 r6:eb74dd8c r5:85665400 r4:85665400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85665400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb74de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca5680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85665400 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6a1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a138c r4:856a1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856a138c r4:84cb6180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85665400 r8:84cb61ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cb6180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cb6180 r8:80287e08 r7:eb73de60 r6:84cb6200 r5:85665400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb74dfb0 to 0xeb74dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ca5040 INFO: task kworker/0:778:5169 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ddf4c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:779:5171 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:779 state:D stack:0 pid:5171 tgid:5171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb761d84 r8:00000002 r7:60000113 r6:eb761d8c r5:85666000 r4:85666000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85666000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb761e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca5480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85666000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb76b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a178c r4:856a1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856a178c r4:84cb6280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85666000 r8:84cb62ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cb6280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cb6280 r8:80287e08 r7:eb74de60 r6:84cb6300 r5:85666000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb761fb0 to 0xeb761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ca5480 INFO: task kworker/0:779:5171 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: de254000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:780:5173 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:780 state:D stack:0 pid:5173 tgid:5173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb769d84 r8:00000002 r7:60000113 r6:eb769d8c r5:84d20000 r4:84d20000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d20000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb769e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca5980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d20000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb777000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a1b8c r4:856a1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856a1b8c r4:84cb6380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d20000 r8:84cb63ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cb6380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cb6380 r8:80287e08 r7:eb761e60 r6:84cb6400 r5:84d20000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb769fb0 to 0xeb769ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ca5700 INFO: task kworker/0:780:5173 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: de254000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:781:5175 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:781 state:D stack:0 pid:5175 tgid:5175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb775d84 r8:00000002 r7:60000113 r6:eb775d8c r5:84d20c00 r4:84d20c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d20c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb775e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca5b00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d20c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb783000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a1f8c r4:856a1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856a1f8c r4:84cb6480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d20c00 r8:84cb64ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cb6480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cb6480 r8:80287e08 r7:eb769e60 r6:84cb6500 r5:84d20c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb775fb0 to 0xeb775ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ca5880 INFO: task kworker/0:781:5175 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: de888000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:782:5177 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:782 state:D stack:0 pid:5177 tgid:5177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb781d84 r8:00000002 r7:60000113 r6:eb781d8c r5:84d21800 r4:84d21800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d21800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb781e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca5cc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d21800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb78f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a238c r4:856a2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856a238c r4:84cb6580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d21800 r8:84cb65ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cb6580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cb6580 r8:80287e08 r7:eb775e60 r6:84cb6600 r5:84d21800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb781fb0 to 0xeb781ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ca5900 INFO: task kworker/0:782:5177 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: de888000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84d22400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb78de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca5e00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d22400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb79b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a278c r4:856a2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856a278c r4:84cb6680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d22400 r8:84cb66ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cb6680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cb6680 r8:80287e08 r7:eb781e60 r6:84cb6700 r5:84d22400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb78dfb0 to 0xeb78dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ca5b40 INFO: task kworker/0:783:5179 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 80000013 ffffffff [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:784:5181 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:784 state:D stack:0 pid:5181 tgid:5181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7a9d84 r8:00000002 r7:60000013 r6:eb7a9d8c r5:85678000 r4:85678000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85678000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ca5240 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85678000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7a3000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a2b8c r4:856a2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856a2b8c r4:84cb6780 r10:61c88647 r9:85678000 r8:84cb67ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb7a9fb0 to 0xeb7a9ff8) r4:84ca5e40 Workqueue: events bpf_prog_free_deferred [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:785:5183 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:785 state:D stack:0 pid:5183 tgid:5183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7b1d84 r8:00000002 r7:60000013 r6:eb7b1d8c r5:85679800 r4:85679800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85679800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f08cc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85679800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7b3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a2f8c r4:856a2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856a2f8c r4:84cb6800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85679800 r8:84cb682c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cb6800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cb6800 r8:80287e08 r7:eb7a9e60 r6:84d77500 r5:85679800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7b1fb0 to 0xeb7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ca5b40 INFO: task kworker/0:785:5183 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ded53000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:786:5185 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:786 state:D stack:0 pid:5185 tgid:5185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7c9d84 r8:00000002 r7:60000113 r6:eb7c9d8c r5:8567b000 r4:8567b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8567b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e3f0c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8567b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7bf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a338c r4:856a3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856a338c r4:84cb6880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8567b000 r8:84cb68ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cb6880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cb6880 r8:80287e08 r7:eb7b1e60 r6:84d77580 r5:8567b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7c9fb0 to 0xeb7c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ca5dc0 INFO: task kworker/0:786:5185 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ded53000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:787:5187 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:787 state:D stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7d1d84 r8:00000002 r7:60000013 r6:eb7d1d8c r5:8567c800 r4:8567c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8567c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e3f2c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8567c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7d3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a378c r4:856a3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856a378c r4:84cb6900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8567c800 r8:84cb692c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cb6900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cb6900 r8:80287e08 r7:eb7c9e60 r6:84d77600 r5:8567c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7d1fb0 to 0xeb7d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e3f000 INFO: task kworker/0:787:5187 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: defbc000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:788:5189 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:788 state:D stack:0 pid:5189 tgid:5189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7e9d84 r8:00000002 r7:60000013 r6:eb7e9d8c r5:8567d400 r4:8567d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8567d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e3f400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8567d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7df000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a3b8c r4:856a3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856a3b8c r4:84cb6980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8567d400 r8:84cb69ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cb6980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cb6980 r8:80287e08 r7:eb7d1e60 r6:84d77680 r5:8567d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7e9fb0 to 0xeb7e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e3f140 INFO: task kworker/0:788:5189 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: df295000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:789:5191 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:789 state:D stack:0 pid:5191 tgid:5191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7bdd84 r8:00000002 r7:60000013 r6:eb7bdd8c r5:84d24800 r4:84d24800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d24800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7bde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e3f740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d24800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7f7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a3f8c r4:856a3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856a3f8c r4:84cb6a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d24800 r8:84cb6a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cb6a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cb6a00 r8:80287e08 r7:eb7e9e60 r6:84cb6a80 r5:84d24800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7bdfb0 to 0xeb7bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e3f3c0 INFO: task kworker/0:789:5191 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: df295000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:790:5192 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:790 state:D stack:0 pid:5192 tgid:5192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7f5d84 r8:00000002 r7:60000013 r6:eb7f5d8c r5:84d26000 r4:84d26000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d26000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e3f840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d26000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7ff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a838c r4:856a8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856a838c r4:84cb6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d26000 r8:84cb6b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cb6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cb6b00 r8:80287e08 r7:eb7bde60 r6:84cb6b80 r5:84d26000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f5fb0 to 0xeb7f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e3f280 INFO: task kworker/0:790:5192 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: df8b3000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:239:5195 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:239 state:D stack:0 pid:5195 tgid:5195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb799d84 r8:00000002 r7:60000113 r6:eb799d8c r5:8567bc00 r4:8567bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8567bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb799e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84cab880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8567bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe83000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855ee78c r4:855ee400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855ee78c r4:84d77700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8567bc00 r8:84d7772c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d77700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d77700 r8:80287e08 r7:eb749e60 r6:84d77780 r5:8567bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb799fb0 to 0xeb799ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cab480 INFO: task kworker/1:239:5195 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: df8b3000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:791:5196 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:791 state:D stack:0 pid:5196 tgid:5196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb731d84 r8:00000002 r7:60000113 r6:eb731d8c r5:84d26c00 r4:84d26c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d26c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb731e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e3fbc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d26c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05e3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a878c r4:856a8400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856a878c r4:84cb6c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d26c00 r8:84cb6c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cb6c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cb6c00 r8:80287e08 r7:eb7f5e60 r6:84cb6c80 r5:84d26c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb731fb0 to 0xeb731ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e3f640 INFO: task kworker/0:791:5196 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: df925000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:240:5200 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:240 state:D stack:0 pid:5200 tgid:5200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7ddd84 r8:00000002 r7:60000013 r6:eb7ddd8c r5:8567e000 r4:8567e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8567e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7dde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f04500 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8567e000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe43000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855eef8c r4:855eec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855eef8c r4:84d77800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8567e000 r8:84d7782c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d77800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d77800 r8:80287e08 r7:eb749e60 r6:84d77880 r5:8567e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7ddfb0 to 0xeb7ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cab680 INFO: task kworker/1:240:5200 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: dfcce000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:792:5202 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:792 state:D stack:0 pid:5202 tgid:5202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb811d84 r8:00000002 r7:60000113 r6:eb811d8c r5:8567a400 r4:8567a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8567a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb811e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e3fdc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8567a400 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a8f8c r4:856a8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856a8f8c r4:84cb6d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8567a400 r8:84cb6d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cb6d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cb6d00 r8:80287e08 r7:eb731e60 r6:84d77900 r5:8567a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb811fb0 to 0xeb811ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e3f980 INFO: task kworker/0:792:5202 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: dfcce000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:793:5204 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:793 state:D stack:0 pid:5204 tgid:5204 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb819d84 r8:00000002 r7:60000113 r6:eb819d8c r5:8567ec00 r4:8567ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8567ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb819e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84cb6d80 r8:80287e08 r7:eb811e60 r6:84d77980 r5:8567ec00 Exception stack(0xe060dd28 to 0xe060dd70) r4:e060ddc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:794:5206 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:794 state:D stack:0 pid:5206 tgid:5206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb821d84 r8:00000002 r7:60000113 r6:eb821d8c r5:85680c00 r4:85680c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85680c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb821e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84e3fc40 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e036d000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856aa38c r4:856aa000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856aa38c r4:84cb6f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85680000 r8:84cb6f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cb6f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cb6f00 r8:80287e08 r7:eb821e60 r6:84d77b00 r5:85680000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb82dfb0 to 0xeb82dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e3fd80 INFO: task kworker/0:796:5209 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:00000000 r5:80000013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856a9b8c r4:856a9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856a9b8c r4:84cb6f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85683c00 r8:84cb6fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84cb6f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84cb6f80 r8:80287e08 r7:eb82de60 r6:84d77b80 r5:85683c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb835fb0 to 0xeb835ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e3fe80 INFO: task kworker/0:797:5211 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e061a000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 r4:8506c000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb83de08 r5:00001000 r4:eae4b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85637000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85637000 r8:80287e08 r7:eb82de60 r6:84d77c00 r5:85683000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb83dfb0 to 0xeb83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c94080 INFO: task kworker/0:798:5213 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e0c96000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc7-syzkaller #0 r5:85681800 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856aab8c r4:856aa800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 Exception stack(0xeb841fb0 to 0xeb841ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f32040 INFO: task kworker/0:799:5216 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e0c96000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r5:84fdf38c r4:84fdf000 Exception stack(0xe060dfb0 to 0xe060dff8) Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb845e08 r5:856aa78c r4:856aa400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856aa78c r4:85637100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85685400 r8:8563712c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85637100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85637100 r8:80287e08 r7:eb841e60 r6:84d77d00 r5:85685400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb845fb0 to 0xeb845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f32040 INFO: task kworker/0:800:5217 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e1214000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:801:5219 blocked for more than 467 seconds. r5:85686000 r4:8291a680 r4:00000000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85686000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb32b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856aaf8c r4:856aac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856aaf8c r4:85637180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85686000 r8:856371ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85637180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85637180 r8:80287e08 r7:eb841e60 r6:84d77d80 r5:85686000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb849fb0 to 0xeb849ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f32400 INFO: task kworker/0:801:5219 is blocked on a mutex likely owned by task kworker/0:201:3787. Call trace: dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r4:00000000 r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84d25400 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb80de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f32800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d25400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb42b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ab38c r4:856ab000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856ab38c r4:85637200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d25400 r8:8563722c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85637200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85637200 r8:80287e08 r7:eb849e60 r6:85637280 r5:84d25400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb80dfb0 to 0xeb80dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f32240 INFO: task kworker/0:802:5221 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e14d8000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 INFO: task kworker/0:803:5223 blocked for more than 467 seconds. r10:8291a684 r9:eb839d84 r8:00000002 r7:60000113 r6:eb839d8c r5:84d23000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb839e08 r4:00000000 r5:856ab78c r4:856ab400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856ab78c r4:85637300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d23000 r8:8563732c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e14d8000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:804:5227 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:804 state:D stack:0 pid:5227 tgid:5227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb84dd84 r8:00000002 r7:60000113 r6:eb84dd8c r5:84d23c00 r4:00000000 r4:00000000 r5:856b0b8c r4:856b0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856b0b8c r4:85637400 r4:85637400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:805:5228 blocked for more than 467 seconds. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:856abf8c r4:856abc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856abf8c r4:85637500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e0000 r8:8563752c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85637500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85637500 r8:80287e08 r7:eb84de60 r6:85637580 r5:856e0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb851fb0 to 0xeb851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f32940 INFO: task kworker/0:805:5228 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e2675000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:855ef38c r4:855ef000 r7:ddde2d80 r6:83018200 r5:855ef38c r4:84d77e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e0c00 r8:84d77e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d77e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d77e00 r8:80287e08 r7:eb749e60 r6:85637600 r5:856e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb765fb0 to 0xeb765ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f04300 INFO: task kworker/1:241:5232 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e2894000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:806:5234 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:806 state:D stack:0 pid:5234 tgid:5234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:eb77dd84 r8:00000002 r7:60000113 r6:eb77dd8c r5:856e3000 r4:00000000 r4:00000000 r5:856b078c r4:856b0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856b078c r4:85637680 r10:61c88647 r9:856e3000 r8:856376ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 80000013 ffffffff [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:856e3c00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:855ef78c r4:855ef400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855ef78c r4:84d77e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e3c00 r8:84d77eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d77e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d77e80 r8:80287e08 r7:eb749e60 r6:85637780 r5:856e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb789fb0 to 0xeb789ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f044c0 INFO: task kworker/1:242:5235 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e32ed000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:856e4800 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb795e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856353c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856e4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb149000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b038c r4:856b0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856b038c r4:85637800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e4800 r8:8563782c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85637800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85637800 r8:80287e08 r7:eb77de60 r6:85637880 r5:856e4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb795fb0 to 0xeb795ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f32e00 INFO: task kworker/0:807:5236 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e3605000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:243:5238 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:243 state:D stack:0 pid:5238 tgid:5238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb69dd84 r8:00000002 r7:60000113 r6:eb69dd8c r5:85684800 r4:85684800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85684800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb69de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f04900 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85684800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab8f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:855efb8c r4:855ef800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:855efb8c r4:84d77f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85684800 r8:84d77f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84d77f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d77f00 r8:80287e08 r7:eb749e60 r6:84d77f80 r5:85684800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb69dfb0 to 0xeb69dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f04700 INFO: task kworker/1:243:5238 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e387e000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:244:5241 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:244 state:D stack:0 pid:5241 tgid:5241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7add84 r8:00000002 r7:60000013 r6:eb7add8c r5:85686c00 r4:85686c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85686c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7ade08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f04b80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85686c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf93000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8405a78c r4:8405a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8405a78c r4:84f01000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85686c00 r8:84f0102c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f01000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f01000 r8:80287e08 r7:eb749e60 r6:84f01080 r5:85686c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7adfb0 to 0xeb7adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f04a80 INFO: task kworker/1:244:5241 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e3c2a000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:245:5242 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:245 state:D stack:0 pid:5242 tgid:5242 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb859d84 r8:00000002 r7:60000113 r6:eb859d8c r5:85678c00 r4:85678c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85678c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb859e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446b040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85678c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1e5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85710f8c r4:85710c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85710f8c r4:84f01100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85678c00 r8:84f0112c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f01100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f01100 r8:80287e08 r7:eb7ade60 r6:84f01180 r5:85678c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb859fb0 to 0xeb859ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f04a80 INFO: task kworker/1:245:5242 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e3e99000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:246:5245 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:246 state:D stack:0 pid:5245 tgid:5245 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7f1d84 r8:00000002 r7:60000113 r6:eb7f1d8c r5:856e5400 r4:856e5400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856e5400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f04d00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb03d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8405a38c r4:8405a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8405a38c r4:84f01200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e5400 r8:84f0122c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f01200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f01200 r8:80287e08 r7:eb859e60 r6:85637900 r5:856e5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f1fb0 to 0xeb7f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f04a40 INFO: task kworker/1:246:5245 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e3fd3000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:247:5246 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:247 state:D stack:0 pid:5246 tgid:5246 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7d9d84 r8:00000002 r7:60000113 r6:eb7d9d8c r5:85688c00 r4:85688c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85688c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f04e00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85688c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb091000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8571038c r4:85710000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8571038c r4:84f01280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85688c00 r8:84f012ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f01280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f01280 r8:80287e08 r7:eb859e60 r6:84f01300 r5:85688c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7d9fb0 to 0xeb7d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f04a40 INFO: task kworker/1:247:5246 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e4219000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:248:5249 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:248 state:D stack:0 pid:5249 tgid:5249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7e5d84 r8:00000002 r7:60000013 r6:eb7e5d8c r5:85688000 r4:85688000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85688000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f04fc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85688000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb115000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8571078c r4:85710400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8571078c r4:84f01380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85688000 r8:84f013ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f01380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f01380 r8:80287e08 r7:eb859e60 r6:84f01400 r5:85688000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7e5fb0 to 0xeb7e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f04e40 INFO: task kworker/1:248:5249 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e4343000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:249:5251 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:249 state:D stack:0 pid:5251 tgid:5251 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb85dd84 r8:00000002 r7:60000013 r6:eb85dd8c r5:85689800 r4:85689800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85689800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb85de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e3f640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85689800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1a9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85710b8c r4:85710800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85710b8c r4:84f01480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85689800 r8:84f014ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f01480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f01480 r8:80287e08 r7:eb859e60 r6:84f01500 r5:85689800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb85dfb0 to 0xeb85dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f04c00 INFO: task kworker/1:249:5251 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e44f1000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:250:5254 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:250 state:D stack:0 pid:5254 tgid:5254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb865d84 r8:00000002 r7:60000113 r6:eb865d8c r5:856e6c00 r4:856e6c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856e6c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb865e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446b0c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb23d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8571138c r4:85711000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8571138c r4:84f01580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e6c00 r8:84f015ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f01580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f01580 r8:80287e08 r7:eb859e60 r6:85637980 r5:856e6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb865fb0 to 0xeb865ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:82ac21e4 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:251:5256 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:251 state:D stack:0 pid:5256 tgid:5256 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb86dd84 r8:00000002 r7:60000113 r6:eb86dd8c r5:856e2400 r4:856e2400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856e2400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb86de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446b6c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb355000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85711f8c r4:85711c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85711f8c r4:84f01600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e2400 r8:84f0162c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f01600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:252:5258 blocked for more than 467 seconds. r4:856e8c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb875e08 r9:83018205 r8:856e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 r5:8571178c r4:85711400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:856e8c00 r8:84f016ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e4bff000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:253:5259 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:253 state:D stack:0 pid:5259 tgid:5259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb879d84 r8:00000002 r7:60000013 r6:eb879d8c r5:856e9800 r4:856e9800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856e9800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85711b8c r4:85711800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85711b8c r4:84f01700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e9800 r8:84f0172c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84f01700 r8:80287e08 r7:eb86de60 r6:85637b00 r5:856e9800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe060dd28 to 0xe060dd70) dd60: 80230ad0 80239bb0 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:254:5261 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:254 state:D stack:0 pid:5261 tgid:5261 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb881d84 r8:00000002 r7:60000013 r6:eb881d8c r5:856e8000 r4:856e8000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856e8000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb881e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446bac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4a5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85712b8c r4:85712800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85712b8c r4:84f01780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e8000 r8:84f017ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f01780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f01780 r8:80287e08 r7:eb86de60 r6:85637b80 r5:856e8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb881fb0 to 0xeb881ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8446b3c0 INFO: task kworker/1:254:5261 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e51a1000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb889e08 r9:83018005 r8:856ebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 r5:856b0f8c r4:856b0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856b0f8c r4:85637c00 r10:00000000 r9:85637c00 r8:80287e08 r7:eb77de60 r6:85637c80 r5:856ebc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb889fb0 to 0xeb889ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85635b40 INFO: task kworker/0:808:5263 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e51a1000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:255:5264 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:255 state:D stack:0 pid:5264 tgid:5264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb88dd84 r8:00000002 r7:60000013 r6:eb88dd8c r5:856ea400 r4:856ea400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856ea400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb88de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446b7c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856ea400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb383000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8571238c r4:85712000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8571238c r4:84f01880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856ea400 r8:84f018ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f01880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f01880 r8:80287e08 r7:eb881e60 r6:85637d00 r5:856ea400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb88dfb0 to 0xeb88dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8446b4c0 INFO: task kworker/1:255:5264 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e530d000 eca69000 00000001 80239b98 7f23f000 00000001 r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:256:5266 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:256 state:D stack:0 pid:5266 tgid:5266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb895d84 r8:00000002 r7:60000013 r6:eb895d8c r5:856eb000 r4:856eb000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856eb000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb895e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446b980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3dd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8571278c r4:85712400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8571278c r4:84f01800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856eb000 r8:84f0182c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f01800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f01800 r8:80287e08 r7:eb881e60 r6:85637d80 r5:856eb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb895fb0 to 0xeb895ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8446b680 INFO: task kworker/1:256:5266 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e57cb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:257:5268 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:257 state:D stack:0 pid:5268 tgid:5268 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb899d84 r8:00000002 r7:60000013 r6:eb899d8c r5:856ed400 r4:856ed400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856ed400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb899e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446bc00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4bf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85712f8c r4:85712c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85712f8c r4:84f01900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856ed400 r8:84f0192c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f01900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f01900 r8:80287e08 r7:eb881e60 r6:85637e00 r5:856ed400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb899fb0 to 0xeb899ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8446ba00 INFO: task kworker/1:257:5268 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e5baa000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:258:5271 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:258 state:D stack:0 pid:5271 tgid:5271 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8a1d84 r8:00000002 r7:60000013 r6:eb8a1d8c r5:856eec00 r4:856eec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a1e08 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85713f8c r4:85713c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85713f8c r4:84f01980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856eec00 r8:84f019ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f01980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f01980 r8:80287e08 r7:eb899e60 r6:85637e80 r5:856eec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8a1fb0 to 0xeb8a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8446ba80 INFO: task kworker/1:258:5271 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e5e42000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:259:5272 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:259 state:D stack:0 pid:5272 tgid:5272 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8a5d84 r8:00000002 r7:60000113 r6:eb8a5d8c r5:856ec800 r4:856ec800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856ec800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446bd40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4cf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8571338c r4:85713000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8571338c r4:84f01a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856ec800 r8:84f01a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f01a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f01a00 r8:80287e08 r7:eb8a1e60 r6:85637f00 r5:856ec800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8a5fb0 to 0xeb8a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8446ba80 INFO: task kworker/1:259:5272 is blocked on a mutex likely owned by task kworker/0:201:3787. Workqueue: events bpf_prog_free_deferred r4:00000000 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:260:5274 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:260 state:D stack:0 pid:5274 tgid:5274 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8add84 r8:00000002 r7:60000013 r6:eb8add8c r5:856e6000 r4:856e6000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856e6000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8ade08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8446be40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4e7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8571378c r4:85713400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8571378c r4:84f01a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856e6000 r8:84f01aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f01a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f01a80 r8:80287e08 r7:eb8a1e60 r6:85637f80 r5:856e6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8adfb0 to 0xeb8adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8446bd80 INFO: task kworker/1:260:5274 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e6167000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:261:5276 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:261 state:D stack:0 pid:5276 tgid:5276 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb805d84 r8:00000002 r7:60000113 r6:eb805d8c r5:8568b000 r4:8568b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8568b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb805e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84f01b00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r5:84fdf38c r4:84fdf000 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8b5d84 r8:00000002 r7:60000113 r6:eb8b5d8c r5:8568c800 r4:8568c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8568c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8b5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c96280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8568c800 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb595000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8571878c r4:85718400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8571878c r4:84f01c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8568c800 r8:84f01c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f01c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f01c00 r8:80287e08 r7:eb8a1e60 r6:84f01c80 r5:8568c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8b5fb0 to 0xeb8b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f041c0 INFO: task kworker/1:262:5279 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e659d000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:263:5280 blocked for more than 468 seconds. r4:8568d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c5e08 r5:00001000 r4:eb583000 r7:ddde2d80 r6:83018200 r5:8571838c r4:84f01d00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r4:00000000 r5:84fdf38c r4:84fdf000 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:264:5282 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:264 state:D stack:0 pid:5282 tgid:5282 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8bdd84 r8:00000002 r7:60000013 r6:eb8bdd8c r5:8568ec00 r4:8568ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8568ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8bde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c96480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8568ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5d5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85718b8c r4:85718800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85718b8c r4:84f01e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8568ec00 r8:84f01e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f01e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f01e00 r8:80287e08 r7:eb8b5e60 r6:84f01e80 r5:8568ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8bdfb0 to 0xeb8bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c96240 INFO: task kworker/1:264:5282 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e6b13000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:265:5284 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:265 state:D stack:0 pid:5284 tgid:5284 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8b9d84 r8:00000002 r7:60000113 r6:eb8b9d8c r5:8568bc00 r4:8568bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8568bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8b9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c96680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8568bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb60d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85718f8c r4:85718c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85718f8c r4:84f01f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8568bc00 r8:84f01f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84f01f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f01f00 r8:80287e08 r7:eb8bde60 r6:84f01f80 r5:8568bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8b9fb0 to 0xeb8b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c96100 INFO: task kworker/1:265:5284 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e6b13000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:266:5288 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:266 state:D stack:0 pid:5288 tgid:5288 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8c1d84 r8:00000002 r7:60000113 r6:eb8c1d8c r5:8568e000 r4:8568e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8568e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c96780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8568e000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb637000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8571938c r4:85719000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8571938c r4:847ec000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8568e000 r8:847ec02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847ec000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ec000 r8:80287e08 r7:eb8b9e60 r6:847ec080 r5:8568e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8c1fb0 to 0xeb8c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c96580 INFO: task kworker/1:266:5288 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e6f7c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:267:5289 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:267 state:D stack:0 pid:5289 tgid:5289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8c5d84 r8:00000002 r7:60000113 r6:eb8c5d8c r5:8568a400 r4:8568a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8568a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c96b00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8568a400 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb699000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85719b8c r4:85719800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85719b8c r4:847ec100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8568a400 r8:847ec12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847ec100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ec100 r8:80287e08 r7:eb8c1e60 r6:847ec180 r5:8568a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8c5fb0 to 0xeb8c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c96580 INFO: task kworker/1:267:5289 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e72eb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:268:5291 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:268 state:D stack:0 pid:5291 tgid:5291 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8c9d84 r8:00000002 r7:60000113 r6:eb8c9d8c r5:85690000 r4:85690000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85690000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c96940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85690000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb65f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8571978c r4:85719400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8571978c r4:847ec200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85690000 r8:847ec22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847ec200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ec200 r8:80287e08 r7:eb8c5e60 r6:847ec280 r5:85690000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8c9fb0 to 0xeb8c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c96580 INFO: task kworker/1:268:5291 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e72eb000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:269:5293 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:269 state:D stack:0 pid:5293 tgid:5293 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8cdd84 r8:00000002 r7:60000013 r6:eb8cdd8c r5:85690c00 r4:85690c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85690c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8cde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c96c40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85690c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6dd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85719f8c r4:85719c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85719f8c r4:847ec300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85690c00 r8:847ec32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847ec300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ec300 r8:80287e08 r7:eb8c5e60 r6:847ec380 r5:85690c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8cdfb0 to 0xeb8cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c96980 INFO: task kworker/1:269:5293 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e76f3000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:270:5295 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:270 state:D stack:0 pid:5295 tgid:5295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8d5d84 r8:00000002 r7:60000113 r6:eb8d5d8c r5:85692400 r4:85692400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85692400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85061680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85692400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc9b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8405af8c r4:8405ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8405af8c r4:847ec400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85692400 r8:847ec42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847ec400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ec400 r8:80287e08 r7:eb8cde60 r6:847ec480 r5:85692400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8d5fb0 to 0xeb8d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c96ac0 INFO: task kworker/1:270:5295 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e7c37000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eb8ddd84 r8:00000002 r7:60000113 r6:eb8ddd8c r5:85691800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8dde08 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85691800 r8:847ec52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847ec500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ec500 r8:80287e08 r7:eb8d5e60 r6:847b2000 r5:85691800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8ddfb0 to 0xeb8ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c96b80 INFO: task kworker/1:271:5297 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e7e48000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:809:5300 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:809 state:D stack:0 pid:5300 tgid:5300 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8d1d84 r8:00000002 r7:60000113 r6:eb8d1d8c r5:856f0000 r4:856f0000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856f0000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847fe700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea991000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b178c r4:856b1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856b178c r4:847b2080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856f0000 r8:847b20ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847b2080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b2080 r8:80287e08 r7:eb889e60 r6:847b2100 r5:856f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8d1fb0 to 0xeb8d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847fe280 task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 r4:84d91880 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:810 state:D stack:0 pid:5301 tgid:5301 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:856f2400 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:856f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:856f2400 r8:847b21ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847fe280 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:811:5304 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:811 state:D stack:0 pid:5304 tgid:5304 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8e5d84 r8:00000002 r7:60000113 r6:eb8e5d8c r5:856f3000 r4:856f3000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856f3000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847fe840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa85000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b1b8c r4:856b1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856b1b8c r4:847b2280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856f3000 r8:847b22ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847b2280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b2280 r8:80287e08 r7:eb8d1e60 r6:847b2300 r5:856f3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8e5fb0 to 0xeb8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847fe640 INFO: task kworker/0:811:5304 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e874b000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:812:5306 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:812 state:D stack:0 pid:5306 tgid:5306 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8edd84 r8:00000002 r7:60000013 r6:eb8edd8c r5:856f3c00 r4:856f3c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856f3c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8ede08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847fe980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacf1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b1f8c r4:856b1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856b1f8c r4:847b2380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856f3c00 r8:847b23ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847b2380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b2380 r8:80287e08 r7:eb8e5e60 r6:847b2400 r5:856f3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8edfb0 to 0xeb8edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847fe640 INFO: task kworker/0:812:5306 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd20: e8d8f000 eca69000 00000001 80239b98 7f23f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:813 state:D stack:0 pid:5308 tgid:5308 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f1e08 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:856b278c r4:847b2480 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: e8d8f000 eca69000 00000001 80239b98 7f23f000 00000001 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb8e9d84 r8:00000002 r7:60000113 r6:eb8e9d8c r5:856f5400 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) INFO: task kworker/0:814:5309 is blocked on a mutex likely owned by task kworker/0:201:3787. dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:815:5313 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:815 state:D stack:0 pid:5313 tgid:5313 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8f5d84 r8:00000002 r7:60000113 r6:eb8f5d8c r5:856f6000 r4:856f6000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856f6000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847fef80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:856b2f8c r4:847b2680 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8fde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847fee00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf3d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b2b8c r4:856b2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856b2b8c r4:847b2780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856f6c00 r8:847b27ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847b2780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b2780 r8:80287e08 r7:eb8f5e60 r6:847b2800 r5:856f6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8fdfb0 to 0xeb8fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847fec80 INFO: task kworker/0:816:5314 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 Exception stack(0xe060dd28 to 0xe060dd70) r4:e060ddc0 r5:00001000 r4:dfc25000 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe060dfb0 to 0xe060dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb901d84 r8:00000002 r7:60000113 r6:eb901d8c r5:856f1800 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eb42d000 r10:61c88647 r9:856f1800 r8:847b28ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c96400 INFO: task kworker/0:817:5316 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: e9a7c000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:818:5318 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:818 state:D stack:0 pid:5318 tgid:5318 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8f9d84 r8:00000002 r7:60000013 r6:eb8f9d8c r5:856f0c00 r4:856f0c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856f0c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c96e80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb321000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe060dfb0 to 0xe060dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e3a280 r7:dddced80 r6:83018000 r5:856b3b8c r4:847b2a80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ea1ca000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:820:5322 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:820 state:D stack:0 pid:5322 tgid:5322 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb919d84 r8:00000002 r7:60000013 r6:eb919d8c r5:85694800 r4:85694800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85694800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb919e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e3a400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85694800 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb47f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856b3f8c r4:856b3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856b3f8c r4:847b2b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85694800 r8:847b2b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847b2b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b2b00 r8:80287e08 r7:eb915e60 r6:847ec600 r5:85694800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ea3b0000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r4:e060ddc0 r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7b5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c038c r4:856c0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856c038c r4:847b2b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85696000 r8:847b2bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:847b2b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b2b80 r8:80287e08 r7:eb919e60 r6:847ec680 r5:85696000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb921fb0 to 0xeb921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e3a100 INFO: task kworker/0:821:5324 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r5:80000013 r4:80239bb0 r5:00001000 r4:dfc25000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:61c88647 r9:856e1800 r8:847b2c2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe060dd28 to 0xe060dd70) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 Exception stack(0xe060dfb0 to 0xe060dff8) task:kworker/0:823 state:D stack:0 pid:5328 tgid:5328 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb91dd84 r8:00000002 r7:60000013 r6:eb91dd8c r5:856ee000 r4:856ee000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856ee000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb91de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e3aa00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856ee000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7fb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c0b8c r4:856c0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856c0b8c r4:847b2d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856ee000 r8:847b2d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847b2d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b2d00 r8:80287e08 r7:eb921e60 r6:847b2d80 r5:856ee000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb91dfb0 to 0xeb91dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e3a580 INFO: task kworker/0:823:5328 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: eae0b000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:824:5329 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:824 state:D stack:0 pid:5329 tgid:5329 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb909d84 r8:00000002 r7:60000013 r6:eb909d8c r5:84e88000 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7d5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c078c r4:856c0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856c078c r4:847b2e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e88000 r8:847b2e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847b2e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b2e00 r8:80287e08 r7:eb91de60 r6:847b2e80 r5:84e88000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb909fb0 to 0xeb909ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e3a580 INFO: task kworker/0:824:5329 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe060dd28 to 0xe060dd70) r4:82ac21e4 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe060dfb0 to 0xe060dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb815000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c0f8c r4:856c0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856c0f8c r4:847b2f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e89800 r8:847b2f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847b2f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847b2f00 r8:80287e08 r7:eb91de60 r6:847b2f80 r5:84e89800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb92dfb0 to 0xeb92dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e3a880 INFO: task kworker/0:825:5332 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: eb1b3000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe060dfb0 to 0xe060dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r4:84e8a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb929e08 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c138c r4:856c1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856c138c r4:84f34000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e8a400 r8:84f3402c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f34000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f34000 r8:80287e08 r7:eb92de60 r6:84f34080 r5:84e8a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb929fb0 to 0xeb929ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84e3aa40 INFO: task kworker/0:826:5335 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: eb31b000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r4:82ac21e4 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:827:5336 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:827 state:D stack:0 pid:5336 tgid:5336 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r7:dddced80 r6:83018000 r5:856c178c r4:84f34100 INFO: task kworker/0:827:5336 is blocked on a mutex likely owned by task kworker/0:201:3787. r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:828:5339 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:828 state:D stack:0 pid:5339 tgid:5339 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb939d84 r8:00000002 r7:60000113 r6:eb939d8c r5:84e8bc00 r4:84e8bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e8bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb939e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e8bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb959000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c238c r4:856c2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856c238c r4:84f34200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84f34200 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84e3ad80 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:829 state:D stack:0 pid:5340 tgid:5340 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84f34300 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb951fb0 to 0xeb951ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f32900 INFO: task kworker/0:829:5340 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ebce5000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:830:5342 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:830 state:D stack:0 pid:5342 tgid:5342 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb95dd84 r8:00000002 r7:60000013 r6:eb95dd8c r5:84e8d400 r4:84e8d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e8d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb95de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f32880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e8d400 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb94d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c1f8c r4:856c1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856c1f8c r4:84f34400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e8d400 r8:84f3442c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f34400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f34400 r8:80287e08 r7:eb939e60 r6:84f34480 r5:84e8d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb95dfb0 to 0xeb95dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f10000 INFO: task kworker/0:830:5342 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 dd20: ebf9c000 eca69000 00000001 80239b98 7f23f000 00000001 r4:e060ddc0 r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:831:5345 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:831 state:D stack:0 pid:5345 tgid:5345 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb969d84 r8:00000002 r7:60000113 r6:eb969d8c r5:84e8e000 r4:84e8e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e8e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb969e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f10300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e8e000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb965000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c278c r4:856c2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856c278c r4:84f34500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e8e000 r8:84f3452c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f34500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r4:84f10240 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80000013 ffffffff r4:00000000 r5:00001000 r4:dfc25000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:8506c000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84e8ec00 r8:84f3462c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f10240 Workqueue: events bpf_prog_free_deferred r5:80000013 r4:80239bb0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:84fdf38c r4:84fdf000 r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:833:5349 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:833 state:D stack:0 pid:5349 tgid:5349 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb981d84 r8:00000002 r7:60000013 r6:eb981d8c r5:856f8000 r4:856f8000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856f8000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb981e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f10500 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb971000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c2b8c r4:856c2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856c2b8c r4:84f34700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856f8000 r8:84f3472c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f34700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f34700 r8:80287e08 r7:eb945e60 r6:84f34780 r5:856f8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb981fb0 to 0xeb981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f104c0 INFO: task kworker/0:833:5349 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ec495000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84d91880 r8:80287e08 r7:e05fde60 r6:84fed500 r5:85036c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8506c000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:834:5350 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:834 state:D stack:0 pid:5350 tgid:5350 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb98dd84 r8:00000002 r7:60000113 r6:eb98dd8c r5:856f8c00 r4:856f8c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856f8c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:856c3b8c r4:856c3800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb98dfb0 to 0xeb98dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f104c0 INFO: task kworker/0:834:5350 is blocked on a mutex likely owned by task kworker/0:201:3787. task:kworker/0:201 state:R running task stack:0 pid:3787 tgid:3787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:85036c00 r8:80200be4 r7:e060dd5c r6:ffffffff r5:85036c00 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe060dd28 to 0xe060dd70) dd20: ec755000 eca69000 00000001 80239b98 7f23f000 00000001 dd40: 82ac15a0 7f23f000 eca69000 8280c928 82ac21c4 e060dda4 e060dda8 e060dd78 dd60: 80230ad0 80239bb0 80000013 ffffffff r5:80000013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e060ddc0 r5:e060de08 r4:e060ddc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85036c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdf38c r4:84fdf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85036c00 r8:84d918ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84d91880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe060dfb0 to 0xe060dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8506c440 r7:dddced80 r6:83018000 r5:84fdf38c r4:84d91880 Exception stack(0xe060dfb0 to 0xe060dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb975d84 r8:00000002 r7:60000113 r6:eb975d8c r5:856fa400 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) task:kworker/0:837 state:D stack:0 pid:5358 tgid:5358 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9cdd84 r8:00000002 r7:60000113 r6:eb9cdd8c r5:85693000 r4:85693000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85693000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9cde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f10e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85693000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9b9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856c3f8c r4:856c3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856c3f8c r4:84f34a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85693000 r8:84f34aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f34a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f34a80 r8:80287e08 r7:eb98de60 r6:847ec780 r5:85693000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9cdfb0 to 0xeb9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f10b40 INFO: task kworker/0:837:5358 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f47e000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:838:5359 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:838 state:D stack:0 pid:5359 tgid:5359 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9d9d84 r8:00000002 r7:60000113 r6:eb9d9d8c r5:85696c00 r4:85696c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f18300 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84f10f40 Workqueue: events bpf_prog_free_deferred Exception stack(0xdf9f1d28 to 0xdf9f1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:839:5360 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:839 state:D stack:0 pid:5360 tgid:5360 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9ddd84 r8:00000002 r7:60000113 r6:eb9ddd8c r5:85748000 r4:85748000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85748000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9dde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f10fc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85748000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9c5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856cc38c r4:856cc000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856cc38c r4:84f34b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85748000 r8:84f34bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f34b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f34b80 r8:80287e08 r7:eb9d9e60 r6:847ec880 r5:85748000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9ddfb0 to 0xeb9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f10e80 INFO: task kworker/0:839:5360 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f47e000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:272:5361 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:272 state:D stack:0 pid:5361 tgid:5361 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85748c00 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:856cf78c r4:847ec900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85748c00 r8:847ec92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847ec900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ec900 r8:80287e08 r7:eb8d5e60 r6:847ec980 r5:85748c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9e1fb0 to 0xeb9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85780040 INFO: task kworker/1:272:5361 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f47e000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:840:5364 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:840 state:D stack:0 pid:5364 tgid:5364 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9edd84 r8:00000002 r7:60000113 r6:eb9edd8c r5:85749800 r4:85749800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85749800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9ede08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e493c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85749800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9d5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856cc78c r4:856cc400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856cc78c r4:84f34c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85749800 r8:84f34c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f34c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f34c00 r8:80287e08 r7:eb9d9e60 r6:847eca00 r5:85749800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9edfb0 to 0xeb9edff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84f10e80 Workqueue: events bpf_prog_free_deferred r4:00000000 1d20: 7f47e000 eca77000 00000001 80239b98 7f1eb000 00000001 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:841:5365 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:841 state:D stack:0 pid:5365 tgid:5365 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9f1d84 r8:00000002 r7:60000013 r6:eb9f1d8c r5:8574a400 r4:8574a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8574a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f18040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8574a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9e9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856ccb8c r4:856cc800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856ccb8c r4:84f34c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8574a400 r8:84f34cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f34c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f34c80 r8:80287e08 r7:eb9d9e60 r6:847eca80 r5:8574a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f1fb0 to 0xeb9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f10e80 INFO: task kworker/0:841:5365 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:842:5368 blocked for more than 469 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba05d84 r8:00000002 r7:60000113 r6:eba05d8c r5:8574b000 r4:8574b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8574b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba05e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f18440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8574b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba01000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856cd38c r4:856cd000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856cd38c r4:84f34d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8574b000 r8:84f34d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f34d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f34d00 r8:80287e08 r7:eb9d9e60 r6:847ecb00 r5:8574b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba05fb0 to 0xeba05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f18000 INFO: task kworker/0:842:5368 is blocked on a mutex likely owned by task kworker/1:6:3130. r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 1d60: 80230ad0 80239bb0 900f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:843:5370 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:843 state:D stack:0 pid:5370 tgid:5370 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba15d84 r8:00000002 r7:60000113 r6:eba15d8c r5:8574c800 r4:8574c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8574c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f187c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8574e000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07e5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856cdf8c r4:856cdc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856cdf8c r4:84f34e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8574e000 r8:84f34e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f34e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f34e00 r8:80287e08 r7:eba15e60 r6:847ecc00 r5:8574e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba1dfb0 to 0xeba1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f182c0 INFO: task kworker/0:844:5372 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 r4:82ac21e4 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:00000001 INFO: task kworker/0:845:5374 blocked for more than 469 seconds. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856cdb8c r4:856cd800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856cdb8c r4:84f34e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8574d400 r8:84f34eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f34e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f34e80 r8:80287e08 r7:eba1de60 r6:847ecc80 r5:8574d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba25fb0 to 0xeba25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f18480 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:846:5376 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:846 state:D stack:0 pid:5376 tgid:5376 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba29d84 r8:00000002 r7:60000113 r6:eba29d8c r5:8574bc00 r4:8574bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8574bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:856ce38c r4:856ce000 r10:61c88647 r9:8574bc00 r8:84f34f2c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 900f0113 ffffffff r4:df9f1dc0 r5:00001000 r4:dfbf9000 r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eae3d000 r7:dddced80 r6:83018000 r5:856ce78c r4:85783000 r10:00000000 r9:85783000 r8:80287e08 r7:eba29e60 r6:847ecd80 r5:8574ec00 r4:84f18800 r4:00000000 r5:900f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r5:84fdef8c r4:84fdec00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 INFO: task kworker/0:848:5380 blocked for more than 469 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba31d84 r8:00000002 r7:60000113 r6:eba31d8c r5:85750000 r4:85750000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85750000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba31e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f18d80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85750000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb07b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856cef8c r4:856cec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856cef8c r4:85783080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85750000 r8:857830ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85783080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85783080 r8:80287e08 r7:eba2de60 r6:847ece00 r5:85750000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba31fb0 to 0xeba31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f18900 INFO: task kworker/0:848:5380 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f47e000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) INFO: task kworker/0:849:5383 blocked for more than 469 seconds. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb353000 r7:dddced80 r6:83018000 r5:856d038c r4:85783100 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:850:5384 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:856cf38c r4:856cf000 r4:85783180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85783180 r8:80287e08 r7:eba39e60 r6:847ecf00 r5:85750c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba3dfb0 to 0xeba3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f18c00 INFO: task kworker/0:850:5384 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:851:5386 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e491c0 r7:dddced80 r6:83018000 r5:856cfb8c r4:85783200 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f47e000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:847d0740 Workqueue: events bpf_prog_free_deferred r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:8571a78c r4:85789000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r5:00001000 r4:dfbf9000 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba21e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c97c00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85754800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3c8000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8571b38c r4:8571b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8571b38c r4:85789100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85754800 r8:8578912c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85789100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85789100 r8:80287e08 r7:eb8d5e60 r6:85789180 r5:85754800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba21fb0 to 0xeba21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85780fc0 INFO: task kworker/1:274:5391 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f47e000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 r5:84fdef8c r4:84fdec00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba49e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f10880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85755400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb28d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856cff8c r4:856cfc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856cff8c r4:85783280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85755400 r8:857832ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85783280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85783280 r8:80287e08 r7:eba39e60 r6:85789200 r5:85755400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba49fb0 to 0xeba49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f18f40 INFO: task kworker/0:852:5393 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f47e000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:853 state:D stack:0 pid:5395 tgid:5395 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba4dd84 r8:00000002 r7:60000013 r6:eba4dd8c r5:85756000 r4:85756000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85756000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba4de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f1d280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85756000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3f5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d0b8c r4:856d0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856d0b8c r4:85783300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85756000 r8:8578332c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85783300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85783300 r8:80287e08 r7:eba39e60 r6:85789280 r5:85756000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba4dfb0 to 0xeba4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfbf9000 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:854:5396 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:854 state:D stack:0 pid:5396 tgid:5396 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f1d100 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85756c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb39f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d078c r4:856d0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856d078c r4:85783380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85756c00 r8:857833ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85783380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85783380 r8:80287e08 r7:eba4de60 r6:85789300 r5:85756c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba51fb0 to 0xeba51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f188c0 INFO: task kworker/0:854:5396 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f47e000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-rc7-syzkaller #0 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba5dd84 r8:00000002 r7:60000013 r6:eba5dd8c r5:842e8c00 r4:842e8c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:842e8c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba5de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f1d3c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:842e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4b3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d0f8c r4:856d0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856d0f8c r4:85783400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:842e8c00 r8:8578342c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85783400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85783400 r8:80287e08 r7:eba4de60 r6:85789380 r5:842e8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba5dfb0 to 0xeba5dff8) dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:900f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:847d0740 Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:856 state:D stack:0 pid:5401 tgid:5401 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba65d84 r8:00000002 r7:60000113 r6:eba65d8c r5:842ea400 r4:842ea400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:842ea400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba65e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f1d500 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:842ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4d9000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:842ea400 r8:857834ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdf9f1d28 to 0xdf9f1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 1fa0: 00000000 00000000 00000000 00000000 r5:842e8000 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeba69fb0 to 0xeba69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f1d240 INFO: task kworker/0:857:5403 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f727000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:858:5405 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:858 state:D stack:0 pid:5405 tgid:5405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba75d84 r8:00000002 r7:60000013 r6:eba75d8c r5:842ebc00 r4:842ebc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:842ebc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba75e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f1d780 r5:00001000 r4:eb50f000 r5:856d1b8c r4:856d1800 r10:61c88647 r9:842ebc00 r8:857835ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f727000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:859:5407 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:859 state:D stack:0 pid:5407 tgid:5407 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8291a684 r9:eba7dd84 r8:00000002 r7:60000113 r6:eba7dd8c r5:842eb000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f1d8c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:842eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb585000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d1f8c r4:856d1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856d1f8c r4:85783600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:842eb000 r8:8578362c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85783600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85783600 r8:80287e08 r7:eba75e60 r6:85789580 r5:842eb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba7dfb0 to 0xeba7dff8) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) INFO: task kworker/0:860:5409 blocked for more than 470 seconds. r4:00000000 r5:856d378c r4:856d3400 r10:00000000 r9:85783680 r8:80287e08 r7:eba7de60 r6:85789600 r5:842ed400 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:861:5410 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:861 state:D stack:0 pid:5410 tgid:5410 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba89d84 r8:00000002 r7:60000113 r6:eba89d8c r5:842ee000 r4:842ee000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:842ee000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba89e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f1da40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:842ee000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5bd000 r5:856d238c r4:856d2000 r10:61c88647 r9:842ee000 r8:8578372c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f727000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:862:5413 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:862 state:D stack:0 pid:5413 tgid:5413 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba95d84 r8:00000002 r7:60000113 r6:eba95d8c r5:85753000 r4:85753000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85753000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85753000 r8:857837ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85783780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85783780 r8:80287e08 r7:eba85e60 r6:85789700 r5:85753000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba95fb0 to 0xeba95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f1d840 INFO: task kworker/0:862:5413 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) task:kworker/0:863 state:D stack:0 pid:5414 tgid:5414 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84fdef8c r4:84fdec00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:864:5417 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:864 state:D stack:0 pid:5417 tgid:5417 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaa5d84 r8:00000002 r7:60000013 r6:ebaa5d8c r5:85758c00 r4:85758c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85758c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f1de00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85758c00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb675000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d2f8c r4:856d2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856d2f8c r4:85783880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85758c00 r8:857838ac r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r5:84fdef8c r4:84fdec00 r4:847e6b00 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291a684 r9:eb9b1d84 r8:00000002 r7:60000113 r6:eb9b1d8c r5:856fe000 r4:856fe000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856fe000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f1df40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d338c r4:856d3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856d338c r4:85783900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856fe000 r8:8578392c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85783900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85783900 r8:80287e08 r7:eba85e60 r6:85783980 r5:856fe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9b1fb0 to 0xeb9b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f1dc00 INFO: task kworker/0:865:5418 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f727000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:dfbf9000 r4:847e6b00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa1e08 r9:83018005 r8:856fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 r10:61c88647 r9:856fec00 r8:85783a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85783a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85783a00 r8:80287e08 r7:eba85e60 r6:85783a80 r5:856fec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaa1fb0 to 0xebaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857a1000 INFO: task kworker/0:866:5421 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f727000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:867:5423 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:856fd400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba55e08 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:856fd400 r8:85783b2c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdf9f1d28 to 0xdf9f1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:868:5425 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:868 state:D stack:0 pid:5425 tgid:5425 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaadd84 r8:00000002 r7:60000013 r6:ebaadd8c r5:856fbc00 r4:856fbc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856fbc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaade08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857a1640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856fbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9f1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:857f878c r4:85783c00 r10:00000000 r9:85783c00 r8:80287e08 r7:eba55e60 r6:85783c80 r5:856fbc00 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfbf9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:869:5427 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:869 state:D stack:0 pid:5427 tgid:5427 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb90dd84 r8:00000002 r7:60000113 r6:eb90dd8c r5:856fc800 r4:856fc800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856fc800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb90de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857a1500 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e014d000 r5:857f838c r4:857f8000 r7:dddced80 r6:83018000 r5:857f838c r4:85783d00 r4:85783d00 Exception stack(0xeb90dfb0 to 0xeb90dff8) r4:857a1300 Workqueue: events bpf_prog_free_deferred Exception stack(0xdf9f1d28 to 0xdf9f1d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:870:5429 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:870 state:D stack:0 pid:5429 tgid:5429 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9bdd84 r8:00000002 r7:60000013 r6:eb9bdd8c r5:856fb000 r4:856fb000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856fb000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9bde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857a17c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac11000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f8b8c r4:857f8800 r7:dddced80 r6:83018000 r5:857f8b8c r4:85783e00 r10:61c88647 r9:856fb000 r8:85783e2c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:871 state:D stack:0 pid:5431 tgid:5431 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba09d84 r8:00000002 r7:60000113 r6:eba09d8c r5:85695400 r4:85695400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85695400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba09e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857a1980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85695400 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eada9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f8f8c r4:857f8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85783f00 r8:80287e08 r7:eb9bde60 r6:85783f80 r5:85695400 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r4:00000000 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebab5d84 r8:00000002 r7:60000113 r6:ebab5d8c r5:84e88c00 r4:84e88c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e88c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebab5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857a1b00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84e88c00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaea9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84e88c00 r8:84f34fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84f34f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84f34f80 r8:80287e08 r7:eba09e60 r6:857ad000 r5:84e88c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebab5fb0 to 0xebab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857a15c0 INFO: task kworker/0:872:5433 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 1d60: 80230ad0 80239bb0 900f0113 ffffffff r4:00000000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:84ea8000 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eaf83000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f978c r4:857f9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857f978c r4:857ad080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ea8000 r8:857ad0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857ad080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ad080 r8:80287e08 r7:ebab5e60 r6:857ad100 r5:84ea8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebab9fb0 to 0xebab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857a1900 INFO: task kworker/0:873:5436 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f727000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:874 state:D stack:0 pid:5438 tgid:5438 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8442d840 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ea9800 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb465000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f9f8c r4:857f9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857f9f8c r4:857ad180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ea9800 r8:857ad1ac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Exception stack(0xdf9f1d28 to 0xdf9f1d70) r4:00000000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:875:5439 blocked for more than 470 seconds. r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84eaa400 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb33d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f9b8c r4:857f9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857f9b8c r4:857ad280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84eaa400 r8:857ad2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857ad280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ad280 r8:80287e08 r7:ebabde60 r6:857ad300 r5:84eaa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebab1fb0 to 0xebab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857a1bc0 INFO: task kworker/0:875:5439 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:00000001 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac9e08 r7:dddced80 r6:83018000 r5:857fa38c r4:857ad380 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f727000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85758000 r4:8291a680 r4:00000000 r4:00000000 r5:00001000 r4:eb7b7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857fa78c r4:857fa400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857fa78c r4:857ad480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85758000 r8:857ad4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857ad480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ad480 r8:80287e08 r7:ebac9e60 r6:85789880 r5:85758000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebacdfb0 to 0xebacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8442d8c0 INFO: task kworker/0:877:5444 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f727000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r4:df9f1dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:8575bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8575bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857aa300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8575bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7cd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857fab8c r4:857fa800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857fab8c r4:857ad500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8575bc00 r8:857ad52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857ad500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ad500 r8:80287e08 r7:ebacde60 r6:85789900 r5:8575bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebad5fb0 to 0xebad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857aa080 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r4:df9f1dc0 r4:00000000 r5:84fdef8c r4:84fdec00 r4:847e6b00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:879 state:D stack:0 pid:5448 tgid:5448 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaddd84 r8:00000002 r7:60000013 r6:ebaddd8c r5:8575b000 r4:8575b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8575b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebadde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857aa940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8575b000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb86f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857fbf8c r4:857fbc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857fbf8c r4:857ad580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8575b000 r8:857ad5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857ad580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ad580 r8:80287e08 r7:ebad5e60 r6:85789980 r5:8575b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaddfb0 to 0xebaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad0 80239bb0 900f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:880:5450 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:880 state:D stack:0 pid:5450 tgid:5450 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebae5d84 r8:00000002 r7:60000013 r6:ebae5d8c r5:8575d400 r4:8575d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8575d400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857aa400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8575d400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7fd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857faf8c r4:857fac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857faf8c r4:857ad600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8575d400 r8:857ad62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857ad600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdf9f1d28 to 0xdf9f1d70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:857fb38c r4:857fb000 r7:dddced80 r6:83018000 r5:857fb38c r4:857ad680 r10:00000000 r9:857ad680 r8:80287e08 r7:ebadde60 r6:85789a80 r5:85759800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebae9fb0 to 0xebae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857aa200 INFO: task kworker/0:881:5451 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f727000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r5:84fdef8c r4:84fdec00 r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857aa6c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8575c800 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb82f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857fb78c r4:857fb400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857fb78c r4:857ad700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8575c800 r8:857ad72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857ad700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ad700 r8:80287e08 r7:ebadde60 r6:85789b00 r5:8575c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaf1fb0 to 0xebaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857aa440 INFO: task kworker/0:882:5453 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f727000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaf9d84 r8:00000002 r7:60000113 r6:ebaf9d8c r5:8575e000 r4:8575e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8575e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857aa800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8575e000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb85f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857fbb8c r4:857fb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857fbb8c r4:857ad780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8575e000 r8:857ad7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857ad780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ad780 r8:80287e08 r7:ebadde60 r6:85789b80 r5:8575e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaf9fb0 to 0xebaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857aa540 INFO: task kworker/0:883:5455 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:884:5457 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:884 state:D stack:0 pid:5457 tgid:5457 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb01d84 r8:00000002 r7:60000113 r6:ebb01d8c r5:8575ec00 r4:8575ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8575ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb01e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857aabc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8575ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 r5:8580078c r4:85800400 r7:dddced80 r6:83018000 r5:8580078c r4:857ad800 r10:00000000 r9:857ad800 r8:80287e08 r7:ebadde60 r6:85789c00 r5:8575ec00 r4:857aa680 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:885:5459 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:885 state:D stack:0 pid:5459 tgid:5459 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb09d84 r8:00000002 r7:60000113 r6:ebb09d8c r5:842eec00 r4:842eec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:842eec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb09e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857aaa80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:842eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb883000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8580038c r4:85800000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8580038c r4:857ad880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:842eec00 r8:857ad8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857ad880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ad880 r8:80287e08 r7:ebb01e60 r6:85789c80 r5:842eec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb09fb0 to 0xebb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 900f0113 ffffffff [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:886:5461 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:886 state:D stack:0 pid:5461 tgid:5461 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb11d84 r8:00000002 r7:60000113 r6:ebb11d8c r5:85760000 r4:85760000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85760000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb11e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857aad00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85760000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8af000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85800b8c r4:85800800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85800b8c r4:857ad900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85760000 r8:857ad92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857ad900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ad900 r8:80287e08 r7:ebb01e60 r6:85789d00 r5:85760000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb11fb0 to 0xebb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857aa900 INFO: task kworker/0:886:5461 is blocked on a mutex likely owned by task kworker/1:6:3130. Call trace: 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85762400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb1de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857aae00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85762400 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb90f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85800f8c r4:85800c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85800f8c r4:857ad980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85762400 r8:857ad9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857ad980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ad980 r8:80287e08 r7:ebb11e60 r6:85789d80 r5:85762400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb1dfb0 to 0xebb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857aaa40 INFO: task kworker/0:887:5464 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f727000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85761800 r4:00000000 r4:00000000 r5:8580138c r4:85801000 r7:dddced80 r6:83018000 r5:8580138c r4:857ada00 r10:00000000 r9:857ada00 r8:80287e08 r7:ebb1de60 r6:85789e00 r5:85761800 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:889:5467 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:889 state:D stack:0 pid:5467 tgid:5467 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb29d84 r8:00000002 r7:60000113 r6:ebb29d8c r5:85763000 r4:85763000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85763000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb29e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f39040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85763000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb947000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8580178c r4:85801400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8580178c r4:857ada80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85763000 r8:857adaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857ada80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847e6b00 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85765400 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb35e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f39280 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85765400 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb955000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85801b8c r4:85801800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85801b8c r4:857adb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85765400 r8:857adb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857adb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857adb00 r8:80287e08 r7:ebb29e60 r6:85789f00 r5:85765400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb35fb0 to 0xebb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f391c0 INFO: task kworker/0:890:5471 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f727000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 r4:00000000 r5:84fdef8c r4:84fdec00 r4:847e6b00 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85766000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb39e08 r9:83018005 r8:85766000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r7:dddced80 r6:83018000 r5:85801f8c r4:857adb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85766000 r8:857adbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857adb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857adb80 r8:80287e08 r7:ebb35e60 r6:85789f80 r5:85766000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb39fb0 to 0xebb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f391c0 INFO: task kworker/0:891:5472 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f727000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:892:5474 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:892 state:D stack:0 pid:5474 tgid:5474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb41d84 r8:00000002 r7:60000113 r6:ebb41d8c r5:85763c00 r4:85763c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85763c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb41e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f395c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85763c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb977000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8580238c r4:85802000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8580238c r4:857adc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85763c00 r8:857adc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857adc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:893:5475 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:893 state:D stack:0 pid:5475 tgid:5475 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb45d84 r8:00000002 r7:60000013 r6:ebb45d8c r5:85760c00 r4:85760c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85760c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb45e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b8480 r5:00001000 r4:ebb95000 r5:85804b8c r4:85804800 r10:61c88647 r9:85760c00 r8:857adcac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84f39300 INFO: task kworker/0:893:5475 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f727000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:894:5477 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:894 state:D stack:0 pid:5477 tgid:5477 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8580278c r4:85802400 r4:857add00 r4:84f39440 Exception stack(0xdf9f1d28 to 0xdf9f1d70) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:895:5479 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:895 state:D stack:0 pid:5479 tgid:5479 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb55d84 r8:00000002 r7:60000013 r6:ebb55d8c r5:85764800 r4:85764800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85764800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb55e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f39800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85764800 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb993000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85802b8c r4:85802800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85802b8c r4:857add80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85764800 r8:857addac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857add80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857add80 r8:80287e08 r7:ebb45e60 r6:842f1180 r5:85764800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb55fb0 to 0xebb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f394c0 INFO: task kworker/0:895:5479 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f727000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85766c00 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 r5:85802f8c r4:85802c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85802f8c r4:857ade00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85766c00 r8:857ade2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:857ade00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ade00 r8:80287e08 r7:ebb45e60 r6:842f1200 r5:85766c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb5dfb0 to 0xebb5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f39680 INFO: task kworker/0:896:5481 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xdf9f1d28 to 0xdf9f1d70) r4:df9f1dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847e6b00 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:8580338c r4:857ade80 r10:61c88647 r9:85768c00 r8:857adeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857ade80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857ade80 r8:80287e08 r7:ebb45e60 r6:842f1280 r5:85768c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb65fb0 to 0xebb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f397c0 INFO: task kworker/0:897:5483 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f727000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:898:5485 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:898 state:D stack:0 pid:5485 tgid:5485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb6dd84 r8:00000002 r7:60000113 r6:ebb6dd8c r5:8576a400 r4:8576a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8576a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb6de08 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8580378c r4:85803400 r10:61c88647 r9:8576a400 r8:857adf2c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f727000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:899:5487 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:899 state:D stack:0 pid:5487 tgid:5487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb75d84 r8:00000002 r7:60000013 r6:ebb75d8c r5:85769800 r4:85769800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85769800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb75e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 r5:85803b8c r4:85803800 r7:dddced80 r6:83018000 r5:85803b8c r4:857adf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85769800 r8:857adfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:857adf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857adf80 r8:80287e08 r7:ebb45e60 r6:842f1380 r5:85769800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb75fb0 to 0xebb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f39c00 INFO: task kworker/0:899:5487 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f9b4000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 r5:00001000 r4:dfbf9000 r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:900:5489 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:900 state:D stack:0 pid:5489 tgid:5489 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb7dd84 r8:00000002 r7:60000113 r6:ebb7dd8c r5:8576bc00 r4:8576bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8576bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb7de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f39e80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8576bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9f5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85803f8c r4:85803c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85803f8c r4:850da000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8576bc00 r8:850da02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850da000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850da000 r8:80287e08 r7:ebb45e60 r6:842f1400 r5:8576bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb7dfb0 to 0xebb7dff8) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d60: 80230ad0 80239bb0 900f0113 ffffffff r4:df9f1dc0 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:901:5492 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:901 state:D stack:0 pid:5492 tgid:5492 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb8dd84 r8:00000002 r7:60000113 r6:ebb8dd8c r5:8576b000 r4:8576b000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8576b000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb8de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f39f80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8576b000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9ff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8580438c r4:85804000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8580438c r4:850da080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8576b000 r8:850da0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850da080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850da080 r8:80287e08 r7:ebb45e60 r6:842f1480 r5:8576b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb8dfb0 to 0xebb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f39d00 INFO: task kworker/0:901:5492 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f9b4000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:902:5494 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:8580478c r4:850da100 r10:00000000 r9:850da100 r8:80287e08 r7:ebb45e60 r6:842f1500 r5:85768000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb99fb0 to 0xebb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f39e00 INFO: task kworker/0:902:5494 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f9b4000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r5:8576d400 r4:8291a680 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r9:83018005 r8:8576d400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 r5:85804f8c r4:85804c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b8c80 INFO: task kworker/0:903:5496 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f9b4000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:904:5498 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:904 state:D stack:0 pid:5498 tgid:5498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba6dd84 r8:00000002 r7:60000013 r6:eba6dd8c r5:8576e000 r5:8576e000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba6de08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8580538c r4:85805000 r10:61c88647 r9:8576e000 r8:850da22c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xdf9f1d28 to 0xdf9f1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r5:84fdef8c r4:84fdec00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:905:5500 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:905 state:D stack:0 pid:5500 tgid:5500 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba8dd84 r8:00000002 r7:60000013 r6:eba8dd8c r5:8576ec00 r4:8576ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8576ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba8de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850df380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8576ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48f7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8580578c r4:85805400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8580578c r4:850da280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8576ec00 r8:850da2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850da280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850da280 r8:80287e08 r7:eba6de60 r6:842f1680 r5:8576ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba8dfb0 to 0xeba8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850df140 INFO: task kworker/0:905:5500 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f9b4000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:8576c800 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85805f8c r4:85805c00 r7:dddced80 r6:83018000 r5:85805f8c r4:850da300 r10:61c88647 r9:8576c800 r8:850da32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850da300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850da300 r8:80287e08 r7:eba8de60 r6:842f1700 r5:8576c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebba9fb0 to 0xebba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850df200 INFO: task kworker/0:906:5502 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f9b4000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:907:5503 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:907 state:D stack:0 pid:5503 tgid:5503 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb21d84 r8:00000002 r7:60000113 r6:ebb21d8c r5:842e9800 r4:842e9800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:842e9800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb21e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850df500 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:842e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb04f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85805b8c r4:85805800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85805b8c r4:850da380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:842e9800 r8:850da3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850da380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850da380 r8:80287e08 r7:ebba9e60 r6:842f1780 r5:842e9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb21fb0 to 0xebb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850df280 INFO: task kworker/0:907:5503 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f9b4000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:908:5507 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:908 state:D stack:0 pid:5507 tgid:5507 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbb5d84 r8:00000002 r7:60000113 r6:ebbb5d8c r5:85771800 r4:85771800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85771800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:85806f8c r4:850da400 r10:00000000 r9:850da400 r8:80287e08 r7:ebba9e60 r6:842f1800 r5:85771800 r4:850df400 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 1d60: 80230ad0 80239bb0 900f0113 ffffffff r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:909:5508 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:909 state:D stack:0 pid:5508 tgid:5508 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbb9d84 r8:00000002 r7:60000013 r6:ebbb9d8c r5:85772400 r4:85772400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85772400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850df780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85772400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb19d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8580638c r4:85806000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8580638c r4:850da480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85772400 r8:850da4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850da480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850da480 r8:80287e08 r7:ebbb5e60 r6:842f1880 r5:85772400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbb9fb0 to 0xebbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850df400 INFO: task kworker/0:909:5508 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f9b4000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:910:5510 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85770c00 r4:8291a680 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:8580678c r4:85806400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850df580 INFO: task kworker/0:910:5510 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f9b4000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:911:5512 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:911 state:D stack:0 pid:5512 tgid:5512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbd1d84 r8:00000002 r7:60000113 r6:ebbd1d8c r5:85773c00 r4:85773c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85773c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbd1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850df680 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85773c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb28b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85806b8c r4:85806800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85806b8c r4:850da580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85773c00 r8:850da5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850da580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850da580 r8:80287e08 r7:ebbb5e60 r6:842f1980 r5:85773c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 1d60: 80230ad0 80239bb0 900f0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:912:5515 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:912 state:D stack:0 pid:5515 tgid:5515 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbd5d84 r8:00000002 r7:60000113 r6:ebbd5d8c r5:85770000 r4:85770000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85770000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbd5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850dfd40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85770000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8580738c r4:85807000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8580738c r4:850da600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85770000 r8:850da62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850da600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850da600 r8:80287e08 r7:ebbb5e60 r6:842f1a00 r5:85770000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbd5fb0 to 0xebbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850df9c0 INFO: task kworker/0:912:5515 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f9b4000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:275:5517 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:275 state:D stack:0 pid:5517 tgid:5517 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbcdd84 r8:00000002 r7:60000113 r6:ebbcdd8c r5:85774800 r4:85774800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85774800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbcde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c97f80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85774800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4af000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8571b78c r4:8571b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8571b78c r4:842f1a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85774800 r8:842f1aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:842f1a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842f1a80 r8:80287e08 r7:eb8d5e60 r6:842f1b00 r5:85774800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbcdfb0 to 0xebbcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c97f00 INFO: task kworker/1:275:5517 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f9b4000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:276:5519 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:276 state:D stack:0 pid:5519 tgid:5519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb89d84 r8:00000002 r7:60000113 r6:ebb89d8c r5:85775400 r4:85775400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85775400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb89e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842bf8c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85775400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb72d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8571bb8c r4:8571b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8571bb8c r4:842f1b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85775400 r8:842f1bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:842f1b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:842f1b80 r8:80287e08 r7:eb8d5e60 r6:842f1c00 r5:85775400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb89fb0 to 0xebb89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c971c0 INFO: task kworker/1:276:5519 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f9b4000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:913:5521 blocked for more than 471 seconds. Workqueue: events bpf_prog_free_deferred r4:85776c00 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:8580938c r4:85809000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8580938c r4:850da680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85776c00 r8:850da6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850da680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850da680 r8:80287e08 r7:ebbd5e60 r6:842f1c80 r5:85776c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbddfb0 to 0xebbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850dfbc0 INFO: task kworker/0:913:5521 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f9b4000 eca77000 00000001 80239b98 7f1eb000 00000001 1d60: 80230ad0 80239bb0 900f0113 ffffffff r4:df9f1dc0 r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Not tainted 6.15.0-rc7-syzkaller #0 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8580778c r4:85807400 r10:00000000 r9:850da700 r8:80287e08 r7:ebbdde60 r6:842f1d00 r5:85778000 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:82ac21e4 r4:00000000 r5:84fdef8c r4:84fdec00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:915:5525 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:915 state:D stack:0 pid:5525 tgid:5525 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbedd84 r8:00000002 r7:60000013 r6:ebbedd8c r5:85779800 r4:85779800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85779800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbede08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850dff40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85779800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb51b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85807b8c r4:85807800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85807b8c r4:850da780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85779800 r8:850da7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850da780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850da780 r8:80287e08 r7:ebbdde60 r6:842f1d80 r5:85779800 dfa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdf9f1d28 to 0xdf9f1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb5c9000 r7:dddced80 r6:83018000 r5:85807f8c r4:850da800 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850dfdc0 INFO: task kworker/0:916:5526 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f9b4000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:917:5528 blocked for more than 471 seconds. task:kworker/0:917 state:D stack:0 pid:5528 tgid:5528 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85778c00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb61d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8580838c r4:85808000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8580838c r4:850da880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85778c00 r8:850da8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850dfec0 Exception stack(0xdf9f1d28 to 0xdf9f1d70) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) Call trace: [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842be040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84eac800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb665000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8580878c r4:85808400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 r4:842be080 INFO: task kworker/0:918:5530 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f9b4000 eca77000 00000001 80239b98 7f1eb000 00000001 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 Call trace: [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85808b8c r4:85808800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85808b8c r4:850daa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8577bc00 r8:850daa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850daa00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850daa00 r8:80287e08 r7:ebbdde60 r6:842f1f00 r5:8577bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc05fb0 to 0xebc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f9b4000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 Workqueue: events bpf_prog_free_deferred [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r7:dddced80 r6:83018000 r5:85808f8c r4:850daa80 Exception stack(0xebc01fb0 to 0xebc01ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842be3c0 INFO: task kworker/0:920:5535 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f9b4000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:00000001 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r7:ddde2d80 r6:83018200 r5:8405b38c r4:85093000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:84fdef8c r4:84fdec00 r4:00000001 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:61c88647 r9:8577e000 r8:850dab2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc0dfb0 to 0xebc0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842be2c0 INFO: task kworker/0:921:5539 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7f9b4000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:922:5541 blocked for more than 471 seconds. r4:8577ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8577ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc11e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842be9c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8577ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba71000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85809f8c r4:85809c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85809f8c r4:850dab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8577ec00 r8:850dabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850dab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850dab80 r8:80287e08 r7:ebc0de60 r6:85093180 r5:8577ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc11fb0 to 0xebc11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:923:5544 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:923 state:D stack:0 pid:5544 tgid:5544 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc1dd84 r8:00000002 r7:60000113 r6:ebc1dd8c r5:85776000 r4:85776000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:85809b8c r4:85809800 r10:61c88647 r9:85776000 r8:850dac2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:842be740 Exception stack(0xdf9f1d28 to 0xdf9f1d70) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:924:5545 blocked for more than 471 seconds. r4:8577b000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8580a38c r4:8580a000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8577b000 r8:850dacac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850dac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850dac80 r8:80287e08 r7:ebc11e60 r6:85093280 r5:8577b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc21fb0 to 0xebc21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842be7c0 INFO: task kworker/0:924:5545 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) task:kworker/0:925 state:D stack:0 pid:5547 tgid:5547 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eba9d000 r10:61c88647 r9:85080c00 r8:850dad2c r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842be980 INFO: task kworker/0:925:5547 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7fc36000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 r4:00000001 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) INFO: task kworker/0:926:5549 blocked for more than 471 seconds. r4:85082400 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842bed80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85082400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc33000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8580ab8c r4:8580a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8580ab8c r4:850dad80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85082400 r8:850dadac r7:82804d40 r6:dddced80 r5:dddceda0 r4:850dad80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850dad80 r8:80287e08 r7:ebc29e60 r6:85093380 r5:85082400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc31fb0 to 0xebc31ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7fc36000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:927:5550 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:927 state:D stack:0 pid:5550 tgid:5550 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc3dd84 r8:00000002 r7:60000013 r6:ebc3dd8c r5:85080000 r4:85080000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85080000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc3de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:842becc0 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:928:5552 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:928 state:D stack:0 pid:5552 tgid:5552 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc4dd84 r8:00000002 r7:60000113 r6:ebc4dd8c r5:85081800 r4:85081800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85081800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc4de08 r4:00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842bec00 INFO: task kworker/0:928:5552 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7fc36000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:df9f1dc0 r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85083000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 r7:dddced80 r6:83018000 r5:8580b38c r4:850daf00 r10:00000000 r9:850daf00 r8:80287e08 r7:ebc3de60 r6:85093500 r5:85083000 r4:842bed00 INFO: task kworker/0:929:5555 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7fc36000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:847d0740 task:kworker/0:930 state:D stack:0 pid:5557 tgid:5557 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc75e08 r9:83018005 r8:85083c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 r7:dddced80 r6:83018000 r5:8571bf8c r4:850daf80 Exception stack(0xebc75fb0 to 0xebc75ff8) task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfbf9000 r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:931:5559 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:931 state:D stack:0 pid:5559 tgid:5559 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc79d84 r8:00000002 r7:60000013 r6:ebc79d8c r5:85085400 r4:85085400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85085400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc79e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85069180 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:8580bb8c r4:8580b800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:dfbf9000 r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:932:5561 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:932 state:D stack:0 pid:5561 tgid:5561 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:85086000 r4:8291a680 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:85077080 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:933:5563 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:933 state:D stack:0 pid:5563 tgid:5563 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc99d84 r8:00000002 r7:60000013 r6:ebc99d8c r5:85086c00 r4:85086c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:61c88647 r9:85086c00 r8:8507712c r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r4:df9f1dc0 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:278:5566 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:278 state:D stack:0 pid:5566 tgid:5566 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc51d84 r8:00000002 r7:60000013 r6:ebc51d8c r5:85084800 r4:85084800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85084800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc51e08 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:85084800 r8:850937ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85061500 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r5:84fdef8c r4:84fdec00 r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:279 state:D stack:0 pid:5567 tgid:5567 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbd9d84 r8:00000002 r7:60000013 r6:ebbd9d8c r5:85773000 r4:85773000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85773000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbd9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c87700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85773000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb477000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8588cf8c r4:8588cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8588cf8c r4:85093880 r10:61c88647 r9:85773000 r8:850938ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85061500 INFO: task kworker/1:279:5567 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7fc36000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r5:00001000 r4:dfbf9000 r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:ebcadd84 r8:00000002 r7:60000113 r6:ebcadd8c r5:84140000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8581078c r4:85810400 r10:61c88647 r9:84140000 r8:850771ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85069300 Workqueue: events bpf_prog_free_deferred [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7fc36000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:935:5571 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:935 state:D stack:0 pid:5571 tgid:5571 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r5:84140c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebce9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850698c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84140c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcf7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85810f8c r4:85810c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85810f8c r4:85077200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84140c00 r8:8507722c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85077200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85077200 r8:80287e08 r7:ebcade60 r6:85093a00 r5:84140c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebce9fb0 to 0xebce9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85069280 INFO: task kworker/0:935:5571 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7fc36000 eca77000 00000001 80239b98 7f1eb000 00000001 1d60: 80230ad0 80239bb0 900f0113 ffffffff r4:df9f1dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:847d0740 task:kworker/0:936 state:D stack:0 pid:5572 tgid:5572 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84141800 r8:850772ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85077280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85077280 r8:80287e08 r7:ebce9e60 r6:85093a80 r5:84141800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcf1fb0 to 0xebcf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850696c0 INFO: task kworker/0:936:5572 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7fc36000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84fdef8c r4:84fdec00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84142400 r8:8507732c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7fc36000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:938:5577 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:938 state:D stack:0 pid:5577 tgid:5577 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebd21d84 r8:00000002 r7:60000113 r6:ebd21d8c r5:84144800 r4:84144800 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8581178c r4:85811400 r4:85077400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 7fc36000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:940:5580 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:940 state:D stack:0 pid:5580 tgid:5580 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:84143c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd35e08 r9:83018005 r8:84143c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r5:8581278c r4:85812400 r10:61c88647 r9:84143c00 r8:850774ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 Call trace: r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb15e08 r5:8588c38c r4:8588c000 r10:61c88647 r9:84145400 r8:85093d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:df9f1dc0 r5:00001000 r4:dfbf9000 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 task:kworker/0:941 state:D stack:0 pid:5588 tgid:5588 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd39e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85069ec0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85830000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead87000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8581238c r4:85812000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8581238c r4:85077500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85830000 r8:8507752c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85077500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85077500 r8:80287e08 r7:ebd21e60 r6:85077580 r5:85830000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd39fb0 to 0xebd39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85069d40 Exception stack(0xdf9f1d28 to 0xdf9f1d70) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:00000001 INFO: task kworker/1:281:5589 blocked for more than 472 seconds. r4:00000000 r5:00001000 r4:eb14d000 r4:85093e00 Workqueue: events bpf_prog_free_deferred r4:82ac21e4 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:942:5590 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcf5e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85069e80 1d20: 7fc36000 eca77000 00000001 80239b98 7f1eb000 00000001 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 1fa0: 00000000 00000000 00000000 00000000 r5:84eae000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd3de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c87800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84eae000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7a1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8588d38c r4:8588d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8588d38c r4:85093e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84eae000 r8:85093eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85093e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85093e80 r8:80287e08 r7:ebbd9e60 r6:85077780 r5:84eae000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd3dfb0 to 0xebd3dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:847d0740 Workqueue: events bpf_prog_free_deferred r5:84eab000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84eab000 r8:8507782c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:85077800 r8:80287e08 r7:ebcf5e60 r6:85077880 r5:84eab000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd41fb0 to 0xebd41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85069fc0 INFO: task kworker/0:943:5593 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 80089000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:283:5597 blocked for more than 472 seconds. [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb2de08 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84c87600 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r5:84fdef8c r4:84fdec00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:284:5599 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:284 state:D stack:0 pid:5599 tgid:5599 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebd49d84 r8:00000002 r7:60000113 r6:ebd49d8c r5:84db0000 r4:84db0000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84db0000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd49e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c87ac0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84db0000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb801000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8588db8c r4:8588d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8588db8c r4:85093f80 r4:85093f80 r4:84c877c0 1d20: 80089000 eca77000 00000001 80239b98 7f1eb000 00000001 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebd4dd84 r8:00000002 r7:60000013 r6:ebd4dd8c r5:84db0c00 r4:84db0c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84db0c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd4de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c87bc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84db0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb81d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8588df8c r4:8588dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8588df8c r4:8508f000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84db0c00 r8:8508f02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8508f000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508f000 r8:80287e08 r7:ebd49e60 r6:85077a00 r5:84db0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd4dfb0 to 0xebd4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 80089000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c87d00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8508f080 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdf9f1d28 to 0xdf9f1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:287:5605 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:287 state:D stack:0 pid:5605 tgid:5605 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebd69d84 r8:00000002 r7:60000113 r6:ebd69d8c r5:84db3c00 r4:84db3c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84db3c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd69e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84db3c00 r8:8508f12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xebd69fb0 to 0xebd69ff8) task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r5:84db2400 r4:8291a680 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c87f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84db2400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:289 state:D stack:0 pid:5610 tgid:5610 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec585d84 r8:00000002 r7:60000113 r6:ec585d8c r5:84db4800 r4:84db4800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84db4800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec585e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c87300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84db4800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8588ef8c r4:8588ec00 Exception stack(0xec585fb0 to 0xec585ff8) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 r4:847e6b00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842bfb40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85831800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb911000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8588f38c r4:8588f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8588f38c r4:8508f280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8508f280 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:82ac21e4 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:842bfac0 INFO: task kworker/1:291:5613 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 80089000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:292:5614 blocked for more than 472 seconds. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd59e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8508f480 r8:80287e08 r7:ebd75e60 r6:8508f500 r5:85833000 r4:84c87f00 Call trace: Exception stack(0xdf9f1d28 to 0xdf9f1d70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:944:5616 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:944 state:D stack:0 pid:5616 tgid:5616 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec589d84 r8:00000002 r7:60000113 r6:ec589d8c r5:85833c00 r4:85833c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85833c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec589e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3bd40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb51000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8589378c r4:85893400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8589378c r4:85077c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85833c00 r8:85077cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85077c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85077c80 r8:80287e08 r7:ebcf5e60 r6:8508f580 r5:85833c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec589fb0 to 0xec589ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8508d980 INFO: task kworker/0:944:5616 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) r5:800f0113 r4:80239bb0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Not tainted 6.15.0-rc7-syzkaller #0 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85060300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85834800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb953000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8588fb8c r4:8588f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8588fb8c r4:8508f600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85834800 r8:8508f62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8508f600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Call trace: 1d20: 80089000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:85835400 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85060440 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8508f700 r8:80287e08 r7:ebd75e60 r6:8508f780 r5:85835400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec591fb0 to 0xec591ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850602c0 INFO: task kworker/1:294:5620 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 80089000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r5:00001000 r4:dfbf9000 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 Not tainted 6.15.0-rc7-syzkaller #0 r4:85836000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8589038c r4:85890000 r4:8508f800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: Exception stack(0xdf9f1d28 to 0xdf9f1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:296:5624 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:296 state:D stack:0 pid:5624 tgid:5624 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec599d84 r8:00000002 r7:60000113 r6:ec599d8c r5:85836c00 r4:85836c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85836c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec599e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85060a80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85836c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9bf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85890f8c r4:85890c00 r4:8508f900 r4:85060600 1d20: 80089000 eca77000 00000001 80239b98 7f1eb000 00000001 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:847d0740 r10:8291a684 r9:ec59dd84 r8:00000002 r7:60000113 r6:ec59dd8c r5:85830c00 r5:00001000 r4:eb9a9000 r10:61c88647 r9:85830c00 r8:8508fa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85060740 INFO: task kworker/1:297:5626 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 80089000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/1:298:5628 blocked for more than 472 seconds. r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:299:5630 blocked for more than 472 seconds. r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85891b8c r4:85891800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85891b8c r4:8508fc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84146c00 r8:8508fc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8508fc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8508fc00 r8:80287e08 r7:ec5a5e60 r6:8508fc80 r5:84146c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5a9fb0 to 0xec5a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85060a00 INFO: task kworker/1:299:5630 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 80089000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r4:82ac21e4 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:800f0113 r4:80239bb0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:61c88647 r9:8583b000 r8:8508ff2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84f3b000 INFO: task kworker/1:302:5635 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 80089000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc7-syzkaller #0 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:800f0113 r4:80239bb0 r5:00001000 r4:dfbf9000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:304:5639 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:304 state:D stack:0 pid:5639 tgid:5639 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5b1d84 r8:00000002 r7:60000113 r6:ec5b1d8c r5:8583a400 r4:8583a400 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:850d6100 r8:80287e08 r7:ec5bde60 r6:850d6180 r5:8583a400 Exception stack(0xdf9f1d28 to 0xdf9f1d70) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fa0: 00000000 00000000 00000000 00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 1d20: 80089000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:306:5644 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:306 state:D stack:0 pid:5644 tgid:5644 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:82ac21e4 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) INFO: task kworker/1:307:5645 blocked for more than 473 seconds. [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:61c88647 r9:8583ec00 r8:850d642c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:945:5650 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:945 state:D stack:0 pid:5650 tgid:5650 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb9dd84 r8:00000002 r7:60000013 r6:ebb9dd8c r5:85840c00 r4:85840c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85840c00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8508db00 Exception stack(0xdf9f1d28 to 0xdf9f1d70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000001 r4:847d0740 r4:85842400 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r7:dddced80 r6:83018000 r5:85812b8c r4:85077d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85842400 r8:85077dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85077d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85077d80 r8:80287e08 r7:ebcf5e60 r6:850d6580 r5:85842400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc2dfb0 to 0xebc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8508d6c0 INFO: task kworker/0:946:5652 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 80089000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84fdef8c r4:84fdec00 r4:00000001 r4:847d0740 r5:85840000 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85069a00 r5:85812f8c r4:85812c00 r4:00000001 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:df9f1dc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fa0: 00000000 00000000 00000000 00000000 r10:8291a684 r9:ebc71d84 r8:00000002 r7:60000113 r6:ebc71d8c r5:85843c00 r4:85843c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85843c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc71e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508b040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85843c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb12b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8581338c r4:85813000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8581338c r4:85077e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85843c00 r8:85077eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85077e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r10:8291a684 r9:ebc95d84 r8:00000002 r7:60000113 r6:ebc95d8c r5:85841800 r5:00001000 r4:eb36d000 r4:85077f00 r4:8508b1c0 1d20: 80089000 eca77000 00000001 80239b98 7f1eb000 00000001 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85844800 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbdf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85893f8c r4:85893c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85893f8c r4:850d6780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85844800 r8:850d67ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850d6780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d6780 r8:80287e08 r7:ec5c1e60 r6:850d6800 r5:85844800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebca9fb0 to 0xebca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:842f2480 INFO: task kworker/1:308:5659 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 80089000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) r4:847d0740 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 80089000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:950:5662 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:950 state:D stack:0 pid:5662 tgid:5662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:84db6000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5cde08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508b400 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85077f80 r8:80287e08 r7:ebc95e60 r6:84e92000 r5:84db6000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r4:00000000 Exception stack(0xdf9f1d28 to 0xdf9f1d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:951:5665 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:84db6c00 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb4cd000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84e92080 r8:80287e08 r7:ebc95e60 r6:84e92100 r5:84db6c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: r4:00000000 Exception stack(0xdf9f1d28 to 0xdf9f1d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebd0dd84 r8:00000002 r7:60000013 r6:ebd0dd8c r5:84db5400 r4:84db5400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84db5400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508b6c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84e92180 r8:80287e08 r7:ebcede60 r6:84e92200 r5:84db5400 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0113 r4:80239bb0 r4:df9f1dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:847d0740 Workqueue: events bpf_prog_free_deferred r5:84db3000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508bcc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84db3000 r8:84e922ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e92280 r4:00000001 Exception stack(0xebd15fb0 to 0xebd15ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: Exception stack(0xdf9f1d28 to 0xdf9f1d70) r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd31e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85818b8c r4:85818800 r4:84e92380 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: 80298000 eca77000 00000001 80239b98 7f1eb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:847d0740 Workqueue: events bpf_prog_free_deferred [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508bf00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r5:84fdef8c r4:84fdec00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84da2400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5d1e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9f1d28 to 0xdf9f1d70) r4:82ac21e4 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:957:5678 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:957 state:D stack:0 pid:5678 tgid:5678 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5e1d84 r8:00000002 r7:60000013 r6:ec5e1d8c r5:84da3000 r4:84da3000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84da3000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5e1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:847e6b00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:8581a38c r4:84e92780 r4:84e92780 Exception stack(0xec5ddfb0 to 0xec5ddff8) r4:8508df80 Workqueue: events bpf_prog_free_deferred Exception stack(0xdf9f1d28 to 0xdf9f1d70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) INFO: task kworker/0:959:5680 blocked for more than 473 seconds. r4:84da4800 r4:00000000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84da4800 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb785000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85819f8c r4:85819c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85819f8c r4:84e92880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84da4800 r8:84e928ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e92880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e92880 r8:80287e08 r7:ec5dde60 r6:84e92900 r5:84da4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5e9fb0 to 0xec5e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8508df80 INFO: task kworker/0:959:5680 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 80298000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84da5400 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8581a78c r4:8581a400 r7:dddced80 r6:83018000 r5:8581a78c r4:84e92980 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5fdd84 r8:00000002 r7:60000113 r6:ec5fdd8c r5:84da6c00 r4:84da6c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84da6c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5fde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85063640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84da6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba6f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8581ab8c r4:8581a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8581ab8c r4:84e92a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84da6c00 r8:84e92aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e92a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e92a80 r8:80287e08 r7:ec5ede60 r6:84e92b00 r5:84da6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5fdfb0 to 0xec5fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850631c0 INFO: task kworker/0:961:5685 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 80298000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r4:82ac21e4 r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:847e6b00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:962:5687 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:962 state:D stack:0 pid:5687 tgid:5687 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5f1d84 r8:00000002 r7:60000113 r6:ec5f1d8c r5:84da0c00 r4:84da0c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84da0c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5f1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85063780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84da0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba8f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8581af8c r4:8581ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84da0c00 r8:84e92bac r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdf9f1d28 to 0xdf9f1d70) r4:82ac21e4 r4:df9f1dc0 r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8581b38c r4:8581b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8581b38c r4:84e92c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84da6000 r8:84e92cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e92c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e92c80 r8:80287e08 r7:ec5f1e60 r6:84e92d00 r5:84da6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec609fb0 to 0xec609ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85063600 INFO: task kworker/0:963:5689 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 80298000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:857d0000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 r5:8581b78c r4:8581b400 r10:61c88647 r9:857d0000 r8:84e92dac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85063700 INFO: task kworker/0:964:5691 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 80298000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 Not tainted 6.15.0-rc7-syzkaller #0 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85063d00 r5:8581bb8c r4:8581b800 r7:dddced80 r6:83018000 r5:8581bb8c r4:84e92e80 r10:00000000 r9:84e92e80 r8:80287e08 r7:ec60de60 r6:84e92f00 r5:857d1800 r4:85063880 Workqueue: events bpf_prog_free_deferred 1d20: 80298000 eca77000 00000001 80239b98 7f1eb000 00000001 r4:df9f1dc0 r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:966:5695 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:966 state:D stack:0 pid:5695 tgid:5695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec611d84 r8:00000002 r7:60000013 r6:ec611d8c r5:857d2400 r4:857d2400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857d2400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec611e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585d2c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857d2400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582478c r4:85824400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582478c r4:84e92f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857d2400 r8:84e92fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84e92f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84e92f80 r8:80287e08 r7:ec615e60 r6:8585c000 r5:857d2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec611fb0 to 0xec611ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff r4:df9f1dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85063e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857d3000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbbb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8581bf8c r4:8581bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8581bf8c r4:8585c080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857d3000 r8:8585c0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8585c080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8585c080 r8:80287e08 r7:ec611e60 r6:8585c100 r5:857d3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec619fb0 to 0xec619ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85063d80 INFO: task kworker/0:967:5696 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 80298000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:85845400 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 r10:61c88647 r9:85845400 r8:8585c1ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 80298000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:8583e000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ebc35000 r5:85824b8c r4:85824800 r7:dddced80 r6:83018000 r5:85824b8c r4:8585c200 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r4:df9f1dc0 r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:310:5703 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:310 state:D stack:0 pid:5703 tgid:5703 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec631d84 r8:00000002 r7:60000113 r6:ec631d8c r5:8583c800 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebc55000 r5:85824f8c r4:85824c00 r10:61c88647 r9:8583c800 r8:850d6aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: 80298000 eca77000 00000001 80239b98 7f1eb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85846c00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85846c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae99000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85825f8c r4:85825c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85825f8c r4:8585c280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85846c00 r8:8585c2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8585c280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8585c280 r8:80287e08 r7:ec62de60 r6:850d6b80 r5:85846c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec639fb0 to 0xec639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8585d140 INFO: task kworker/0:970:5705 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 80298000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:971:5706 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:971 state:D stack:0 pid:5706 tgid:5706 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec63dd84 r8:00000002 r7:60000013 r6:ec63dd8c r5:85848000 r4:85848000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85848000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8585db80 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582538c r4:85825000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582538c r4:8585c300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85848000 r8:8585c32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8585c300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8585c300 r8:80287e08 r7:ec639e60 r6:850d6c00 r5:85848000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec63dfb0 to 0xec63dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8585d140 INFO: task kworker/0:971:5706 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 80298000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:311:5708 blocked for more than 473 seconds. r4:85848c00 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85866400 r5:858a078c r4:858a0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:850d6c80 Exception stack(0xec635fb0 to 0xec635ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r4:00000000 r5:84fdef8c r4:84fdec00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:312:5710 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:312 state:D stack:0 pid:5710 tgid:5710 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec625d84 r8:00000002 r7:60000113 r6:ec625d8c r5:85849800 r4:85849800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85849800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec625e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85866580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85849800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc9d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a0b8c r4:858a0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a0b8c r4:850d6d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85849800 r8:850d6dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850d6d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d6d80 r8:80287e08 r7:ec635e60 r6:850d6e00 r5:85849800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec625fb0 to 0xec625ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85866200 INFO: task kworker/1:312:5710 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:82ac21e4 r4:00000000 r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:313:5712 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:313 state:D stack:0 pid:5712 tgid:5712 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec641d84 r8:00000002 r7:60000013 r6:ec641d8c r5:8584a400 r4:8584a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8584a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:850d6e80 Exception stack(0xec641fb0 to 0xec641ff8) r4:85866380 Workqueue: events bpf_prog_free_deferred 1d20: 80298000 eca77000 00000001 80239b98 7f1eb000 00000001 r4:df9f1dc0 r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:847e6b00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:8584b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 r7:ddde2d80 r6:83018200 r5:858a178c r4:850d6f80 r4:850d6f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850d6f80 r8:80287e08 r7:ec641e60 r6:8585b000 r5:8584b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec645fb0 to 0xec645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85866500 INFO: task kworker/1:314:5715 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 80298000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:315 state:D stack:0 pid:5716 tgid:5716 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858668c0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8585b080 r8:80287e08 r7:ec645e60 r6:8585b100 r5:8584bc00 r4:85866500 Call trace: 1d20: 80298000 eca77000 00000001 80239b98 7f1eb000 00000001 r4:df9f1dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847e6b00 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:316:5718 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:316 state:D stack:0 pid:5718 tgid:5718 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec64dd84 r8:00000002 r7:60000113 r6:ec64dd8c r5:8584c800 r4:8584c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8584c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec64de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c86040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8584c800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6af000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a278c r4:858a2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a278c r4:8585b180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8585b180 dfa0: 00000000 00000000 00000000 00000000 Call trace: 1d20: 80298000 eca77000 00000001 80239b98 7f1eb000 00000001 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:dfbf9000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85825b8c r4:8585c380 r10:00000000 r9:8585c380 r8:80287e08 r7:ec639e60 r6:8585b280 r5:8584d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec651fb0 to 0xec651ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8585dc40 INFO: task kworker/0:972:5722 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 80298000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:317:5724 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:317 state:D stack:0 pid:5724 tgid:5724 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291a684 r9:ec621d84 r8:00000002 r7:60000113 r6:ec621d8c r5:8584e000 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8442db80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8584e000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb853000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a1b8c r4:858a1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a1b8c r4:8585b300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8584e000 r8:8585b32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8585b300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8585b300 r8:80287e08 r7:ec64de60 r6:8585b380 r5:8584e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec621fb0 to 0xec621ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:84fdef8c r4:84fdec00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:847d0740 Workqueue: events bpf_prog_free_deferred [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8585c400 r8:80287e08 r7:ec639e60 r6:8585b400 r5:8584ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec655fb0 to 0xec655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8585dd40 INFO: task kworker/0:973:5726 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 80298000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84fdef8c r4:84fdec00 r4:847e6b00 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb45b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec659fb0 to 0xec659ff8) Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:975:5730 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:975 state:D stack:0 pid:5730 tgid:5730 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec65dd84 r8:00000002 r7:60000013 r6:ec65dd8c r5:857e8c00 r4:857e8c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857e8c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec65de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:842f23c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb79f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85826b8c r4:85826800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85826b8c r4:8585c500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857e8c00 r8:8585c52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8585c500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800f0113 r4:80239bb0 r4:df9f1dc0 r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:847e6b00 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:976:5732 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:976 state:D stack:0 pid:5732 tgid:5732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec661d84 r8:00000002 r7:60000113 r6:ec661d8c r5:857e9800 r4:857e9800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857e9800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec661e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85063f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7e1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85826f8c r4:85826c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85826f8c r4:8585c580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857e9800 r8:8585c5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8585c580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8585c580 r8:80287e08 r7:ec65de60 r6:8585b580 r5:857e9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:857ea400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec665e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:978:5737 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:978 state:D stack:0 pid:5737 tgid:5737 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb0dd84 r8:00000002 r7:60000013 r6:ebb0dd8c r5:857eb000 r4:857eb000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857eb000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb0de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85827f8c r4:85827c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) task:kworker/0:979 state:D stack:0 pid:5739 tgid:5739 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec671e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85075180 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857ec800 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb87b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582778c r4:85827400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582778c r4:8585c700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857ec800 r8:8585c72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8585c700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8585c700 r8:80287e08 r7:ebb0de60 r6:8585b700 r5:857ec800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec671fb0 to 0xec671ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 80298000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 r5:84fdef8c r4:84fdec00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 Not tainted 6.15.0-rc7-syzkaller #0 r5:857ebc00 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:ddde2d80 r6:83018200 r5:858a1f8c r4:8585b780 r10:00000000 r9:8585b780 r8:80287e08 r7:ec64de60 r6:8585b800 r5:857ebc00 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 80298000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ec67dd84 r8:00000002 r7:60000013 r6:ec67dd8c r5:857ee000 r4:00000000 r5:85827b8c r4:85827800 r10:61c88647 r9:857ee000 r8:8585c7ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:84fdef8c r4:84fdec00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:857ed400 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec685e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850756c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb95f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582878c r4:85828400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582878c r4:8585c800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857ed400 r8:8585c82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8585c800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8585c800 r8:80287e08 r7:ebb0de60 r6:8585b900 r5:857ed400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec685fb0 to 0xec685ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85075280 INFO: task kworker/0:981:5744 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 80298000 eca77000 00000001 80239b98 7f1eb000 00000001 r4:82ac21e4 r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 1fa0: 00000000 00000000 00000000 00000000 Call trace: r5:857d6000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec669e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85075540 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857d6000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb93f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582838c r4:85828000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582838c r4:8585c880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857d6000 r8:8585c8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8585c880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8585c880 r8:80287e08 r7:ec685e60 r6:8585c900 r5:857d6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec669fb0 to 0xec669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85075280 INFO: task kworker/0:982:5745 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:983:5748 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:983 state:D stack:0 pid:5748 tgid:5748 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec681d84 r8:00000002 r7:60000013 r6:ec681d8c r5:857d5400 r4:857d5400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857d5400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec681e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85075800 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8585c980 Exception stack(0xec681fb0 to 0xec681ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xdf9f1d28 to 0xdf9f1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r5:84fdef8c r4:84fdec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:984:5751 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:984 state:D stack:0 pid:5751 tgid:5751 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec689d84 r8:00000002 r7:60000013 r6:ec689d8c r5:857d6c00 r4:857d6c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857d6c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec689e08 r7:dddced80 r6:83018000 r5:85828f8c r4:8585ca80 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0113 r4:80239bb0 r4:00000000 r5:00001000 r4:dfbf9000 r4:847e6b00 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) Not tainted 6.15.0-rc7-syzkaller #0 r5:857d3c00 r4:8291a680 r4:00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85075bc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857d3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9b3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582938c r4:85829000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582938c r4:8585cb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857d3c00 r8:8585cbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8585cb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8585cb80 r8:80287e08 r7:ec689e60 r6:8585cc00 r5:857d3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec66dfb0 to 0xec66dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff r4:00000000 r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:986:5755 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:986 state:D stack:0 pid:5755 tgid:5755 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec691d84 r8:00000002 r7:60000013 r6:ec691d8c r5:857d4800 r4:857d4800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec691e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff r4:00000000 r5:84fdef8c r4:84fdec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:987:5756 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:987 state:D stack:0 pid:5756 tgid:5756 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6a5d84 r8:00000002 r7:60000013 r6:ec6a5d8c r5:857d0c00 r4:857d0c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857d0c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6a5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85075c80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9d1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582978c r4:85829400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582978c r4:8585cd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857d0c00 r8:8585cdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8585cd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:988:5757 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:988 state:D stack:0 pid:5757 tgid:5757 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec69dd84 r8:00000002 r7:60000113 r6:ec69dd8c r5:85843000 r4:85843000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85843000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8585ce80 r8:80287e08 r7:ec691e60 r6:8585cf00 r5:85843000 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6a9e08 r10:61c88647 r9:84ff8000 r8:8585cfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000000 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84ff8c00 r9:83018005 r8:84ff8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:991:5764 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:991 state:D stack:0 pid:5764 tgid:5764 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6bdd84 r8:00000002 r7:60000013 r6:ec6bdd8c r5:84ff9800 r4:84ff9800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ff9800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6bde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:84ff9800 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8582a78c r4:8586b180 r4:8586b180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d60: 80230ad0 80239bb0 800f0113 ffffffff r4:82ac21e4 r4:df9f1dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:992:5767 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:992 state:D stack:0 pid:5767 tgid:5767 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6c1d84 r8:00000002 r7:60000113 r6:ec6c1d8c r5:84ffa400 r4:84ffa400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ffa400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6c1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85867640 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ffa400 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb3b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582af8c r4:8582ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582af8c r4:8586b280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ffa400 r8:8586b2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8586b280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586b280 r8:80287e08 r7:ec6b9e60 r6:8586b300 r5:84ffa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6c1fb0 to 0xec6c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85867340 INFO: task kworker/0:992:5767 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 818df000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:993:5769 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:993 state:D stack:0 pid:5769 tgid:5769 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6c9d84 r8:00000002 r7:60000113 r6:ec6c9d8c r5:84ffb000 r4:84ffb000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ffb000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6c9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85867940 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ffb000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb69000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582b78c r4:8582b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582b78c r4:8586b380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ffb000 r8:8586b3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8586b380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586b380 r8:80287e08 r7:ec6c1e60 r6:8586b400 r5:84ffb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 81b79000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r4:84ffbc00 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85867780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ffbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb57000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582b38c r4:8582b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582b38c r4:8586b480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ffbc00 r8:8586b4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8586b480 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac21e4 r5:84fdef8c r4:84fdec00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:995:5772 blocked for more than 474 seconds. r4:84ffc800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6c5e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:319:5774 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:319 state:D stack:0 pid:5774 tgid:5774 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6e1d84 r8:00000002 r7:60000113 r6:ec6e1d8c r5:84ffe000 r4:84ffe000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ffe000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6e1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84c86580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ffe000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5f3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a238c r4:858a2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a238c r4:8585b980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ffe000 r8:8585b9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8585b980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8585b980 r8:80287e08 r7:ec64de60 r6:8586b680 r5:84ffe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6e1fb0 to 0xec6e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85867e40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857d8000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd77000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8582bf8c r4:8582bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8582bf8c r4:8586b700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857d8000 r8:8586b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8586b700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586b700 r8:80287e08 r7:ec6c5e60 r6:8585ba00 r5:857d8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6d1fb0 to 0xec6d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad0 80239bb0 800f0113 ffffffff r4:df9f1dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ec6e5d84 r8:00000002 r7:60000013 r6:ec6e5d8c r5:857d8c00 r7:dddced80 r6:83018000 r5:858bc38c r4:8586b780 r10:00000000 r9:8586b780 r8:80287e08 r7:ec6d1e60 r6:8585ba80 r5:857d8c00 r4:00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8585bb00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8262a000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6e9fb0 to 0xec6e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84c863c0 INFO: task kworker/1:321:5782 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 82961000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:847e6b00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:857dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 r7:dddced80 r6:83018000 r5:858bc78c r4:8586b800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) Call trace: r10:8291a684 r9:ec721d84 r8:00000002 r7:60000113 r6:ec721d8c r5:857dc800 r4:857dc800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857dc800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec721e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586e340 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857dc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec71d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858bcb8c r4:858bc800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858bcb8c r4:8586b880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857dc800 r8:8586b8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8586b880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586b880 r8:80287e08 r7:ec719e60 r6:8585bd80 r5:857dc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec721fb0 to 0xec721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8586e100 INFO: task kworker/0:999:5786 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 82b6b000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:857dd400 r4:8291a680 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec72de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586e480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857dd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec729000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858bcf8c r4:858bcc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858bcf8c r4:8586b900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 r5:00001000 r4:dfbf9000 r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:1001:5790 blocked for more than 474 seconds. Call trace: r5:857d9800 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586e580 r5:858bd38c r4:858bd000 r7:dddced80 r6:83018000 r5:858bd38c r4:8586b980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857d9800 r8:8586b9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8586b980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586b980 r8:80287e08 r7:ec72de60 r6:8585be80 r5:857d9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec749fb0 to 0xec749ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8586e300 INFO: task kworker/0:1001:5790 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 830f5000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1002:5792 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1002 state:D stack:0 pid:5792 tgid:5792 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec759d84 r8:00000002 r7:60000113 r6:ec759d8c r5:857dec00 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:8586ba00 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 830f5000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 r4:00000001 INFO: task kworker/0:1003:5793 blocked for more than 474 seconds. Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec75dd84 r8:00000002 r7:60000113 r6:ec75dd8c r5:857eec00 r4:857eec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857eec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec75de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586ed80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:858beb8c r4:8586ba80 r4:8586ba80 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 83393000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:858bdb8c r4:8586bb00 r4:8586bb00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff r4:df9f1dc0 r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1005:5798 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1005 state:D stack:0 pid:5798 tgid:5798 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec78dd84 r8:00000002 r7:60000113 r6:ec78dd8c r5:85851800 r4:85851800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85851800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec78de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586e980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85851800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec76d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858bdf8c r4:858bdc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858bdf8c r4:8586bb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85851800 r8:8586bbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8586bb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586bb80 r8:80287e08 r7:ec75de60 r6:858f6080 r5:85851800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec78dfb0 to 0xec78dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1006:5799 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1006 state:D stack:0 pid:5799 tgid:5799 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec791d84 r8:00000002 r7:60000013 r6:ec791d8c r5:85850000 r4:85850000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85850000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec791e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:858be38c r4:8586bc00 r4:00000001 INFO: task kworker/0:1006:5799 is blocked on a mutex likely owned by task kworker/1:6:3130. 1d60: 80230ad0 80239bb0 800f0113 ffffffff r4:df9f1dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1007:5801 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1007 state:D stack:0 pid:5801 tgid:5801 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6edd84 r8:00000002 r7:60000113 r6:ec6edd8c r5:84ffec00 r4:84ffec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ffec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6ede08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586ec00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ffec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec789000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858be78c r4:858be400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858be78c r4:8586bc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ffec00 r8:8586bcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8586bc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586bc80 r8:80287e08 r7:ec75de60 r6:8586bd00 r5:84ffec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6edfb0 to 0xec6edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec795d84 r8:00000002 r7:60000013 r6:ec795d8c r5:84ffd400 r4:84ffd400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84ffd400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec795e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586e000 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ffd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7e1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858bf38c r4:858bf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858bf38c r4:8586bd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84ffd400 r8:8586bdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8586bd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xec795fb0 to 0xec795ff8) INFO: task kworker/0:1008:5804 is blocked on a mutex likely owned by task kworker/1:6:3130. 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:857f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858bef8c r4:8586be80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857f0000 r8:8586beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8586be80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586be80 r8:80287e08 r7:ec795e60 r6:8586bf00 r5:857f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec731fb0 to 0xec731ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8586eb80 INFO: task kworker/0:1009:5805 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8409e000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:1010 state:D stack:0 pid:5808 tgid:5808 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85902040 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/0:1010:5808 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8409e000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:857f1800 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:857f1800 r8:859000ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:85900080 r8:80287e08 r7:ec7ade60 r6:85900100 r5:857f1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7edfb0 to 0xec7edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859021c0 INFO: task kworker/0:1011:5811 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 845d9000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7f9e08 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec7f9fb0 to 0xec7f9ff8) Call trace: 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r5:857f3000 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85902480 r4:85900280 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1014:5815 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1014 state:D stack:0 pid:5815 tgid:5815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec811d84 r8:00000002 r7:60000013 r6:ec811d8c r5:857f4800 r4:857f4800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857f4800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec811e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85902e80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:858c478c r4:858c4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:857f4800 r8:859003ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 Exception stack(0xec811fb0 to 0xec811ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85902440 INFO: task kworker/0:1014:5815 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 84b40000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:322:5818 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:322 state:D stack:0 pid:5818 tgid:5818 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec831d84 r8:00000002 r7:60000113 r6:ec831d8c r5:857f6000 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:858a2f8c r4:858a2c00 r4:858f6180 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:82ac21e4 r5:00001000 r4:dfbf9000 1fa0: 00000000 00000000 00000000 00000000 r4:857f6c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857f6c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec839e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8442dd00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb139000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8405bf8c r4:8405bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8405bf8c r4:85900500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857f6c00 r8:8590052c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85900500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85900500 r8:80287e08 r7:ec811e60 r6:85900580 r5:857f6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec839fb0 to 0xec839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85902880 INFO: task kworker/0:1015:5820 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) r4:82ac21e4 r5:84fdef8c r4:84fdec00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:858c4b8c r4:858c4800 r4:00000001 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1017:5829 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1017 state:D stack:0 pid:5829 tgid:5829 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec7cdd84 r8:00000002 r7:60000013 r6:ec7cdd8c r5:84d11800 r4:84d11800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d11800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7cde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85902a40 r4:00000000 r9:83018005 r8:84d11800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 r5:858c4f8c r4:858c4c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85902d80 Call trace: 1d20: 857a6000 eca77000 00000001 80239b98 7f1eb000 00000001 r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1018:5831 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1018 state:D stack:0 pid:5831 tgid:5831 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec825d84 r8:00000002 r7:60000113 r6:ec825d8c r5:84d12400 r4:84d12400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d12400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4eb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c538c r4:858c5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c538c r4:85900800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d12400 r8:8590082c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85900800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85900800 r8:80287e08 r7:ec7cde60 r6:85900880 r5:84d12400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85902f00 Workqueue: events bpf_prog_free_deferred 1d20: 85bee000 eca77000 00000001 80239b98 7f1eb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r5:84fdef8c r4:84fdec00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85854800 r4:8291a680 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85877480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85854800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48a1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858a3b8c r4:858a3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:858a3b8c r4:858f6200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85854800 r8:858f622c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858f6200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858f6200 r8:80287e08 r7:ec6dde60 r6:858f6280 r5:85854800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec84dfb0 to 0xec84dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85877180 INFO: task kworker/1:323:5832 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 1d20: 85f5b000 eca77000 00000001 80239b98 7f1eb000 00000001 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:ec851d84 r8:00000002 r7:60000113 r6:ec851d8c r5:85855400 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:858a3f8c r4:858a3c00 r10:61c88647 r9:85855400 r8:858f632c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:859040c0 INFO: task kworker/1:324:5833 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 86301000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:325:5835 blocked for more than 475 seconds. task:kworker/1:325 state:D stack:0 pid:5835 tgid:5835 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec859e08 r4:00000000 r5:8593438c r4:85934000 r7:ddde2d80 r6:83018200 r5:8593438c r4:858f6400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:82ac21e4 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1019:5836 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1019 state:D stack:0 pid:5836 tgid:5836 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec85dd84 r8:00000002 r7:60000113 r6:ec85dd8c r5:85852400 r4:85852400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85852400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec85de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85902a00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85852400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 r5:858c578c r4:858c5400 r10:61c88647 r9:85852400 r8:8590092c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8442dd80 INFO: task kworker/0:1019:5836 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 86b3c000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r5:84fdef8c r4:84fdec00 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec861e08 r9:83018205 r8:85853000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 r5:858cf38c r4:858cf000 r4:00000001 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85902300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85853c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb635000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c5b8c r4:858c5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c5b8c r4:85900a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85853c00 r8:85900a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85900a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85900a00 r8:80287e08 r7:ec869e60 r6:858f6700 r5:85853c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec871fb0 to 0xec871ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8590a100 INFO: task kworker/0:1021:5841 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r5:84fdef8c r4:84fdec00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r5:85100000 r4:8291a680 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:85900a80 r4:8590a040 Exception stack(0xdf9f1d28 to 0xdf9f1d70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1023:5844 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1023 state:D stack:0 pid:5844 tgid:5844 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec87dd84 r8:00000002 r7:60000013 r6:ec87dd8c r5:85101800 r4:85101800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85101800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec87de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8590a300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85101800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb779000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85101800 r8:85900b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8590a240 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:84fdef8c r4:84fdec00 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) task:kworker/0:1024 state:D stack:0 pid:5846 tgid:5846 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec849e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8590a480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84d13000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba11000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:858c678c r4:858c6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:858c678c r4:85900b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d13000 r8:85900bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85900b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85900b80 r8:80287e08 r7:ec869e60 r6:85900c00 r5:84d13000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec849fb0 to 0xec849ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r5:00001000 r4:dfbf9000 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) r5:84d16000 r4:8291a680 r4:00000000 r10:61c88647 r9:84d16000 r8:858f68ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec855fb0 to 0xec855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8592d0c0 INFO: task kworker/1:327:5868 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d20: 882f6000 eca77000 00000001 80239b98 7f1eb000 00000001 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 INFO: task kworker/1:328:5927 blocked for more than 475 seconds. [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592d9c0 r5:8593478c r4:85934400 r7:ddde2d80 r6:83018200 r5:8593478c r4:858f6900 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:329:5928 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:329 state:D stack:0 pid:5928 tgid:5928 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec8bdd84 r8:00000002 r7:60000113 r6:ec8bdd8c r5:85102400 r4:85102400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85102400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8bde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592dbc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85102400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4cb000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85934b8c r4:85934800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85934b8c r4:858f6a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85102400 r8:858f6a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858f6a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858f6a00 r8:80287e08 r7:ec8fde60 r6:858f6a80 r5:85102400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8bdfb0 to 0xec8bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8592d740 INFO: task kworker/1:329:5928 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:df9f1dc0 r5:84fdef8c r4:84fdec00 r4:00000001 r4:847d0740 r4:85106000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d4c80 r7:ddde2d80 r6:83018200 r5:85935f8c r4:858f6b00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 88b65000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r7:ddde2d80 r6:83018200 r5:8593538c r4:858f6c00 5fa0: 00000000 00000000 00000000 00000000 r4:8592da40 INFO: task kworker/1:331:5931 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 88ebe000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 Not tainted 6.15.0-rc7-syzkaller #0 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859d43c0 r9:83018205 r8:85100c00 r7:00000000 r6:83018200 r5:00001000 r4:7f161000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca65000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85935b8c r4:85935800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85935b8c r4:858f6d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85100c00 r8:858f6d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858f6d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858f6d00 r8:80287e08 r7:ec83de60 r6:858f6d80 r5:85100c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9a1fb0 to 0xec9a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85111600 INFO: task kworker/1:332:5960 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8979e000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 r5:84fdef8c r4:84fdec00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 Not tainted 6.15.0-rc7-syzkaller #0 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 r9:83018205 r8:85103c00 r7:00000000 r6:83018200 r5:00001000 r4:7f163000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca6d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85309b8c r4:85309800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85309b8c r4:858f6e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85103c00 r8:858f6e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:858f6e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858f6e00 r8:80287e08 r7:ec83de60 r6:858f6e80 r5:85103c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca49fb0 to 0xeca49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:859d49c0 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 1d60: 80230ad0 80239bb0 800f0113 ffffffff r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eca71d84 r8:00000002 r7:60000113 r6:eca71d8c r5:85103000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:858f6f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:858f6f00 r8:80287e08 r7:ec83de60 r6:858f6f80 r5:85103000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca71fb0 to 0xeca71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859d4500 INFO: task kworker/1:334:6023 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 89f11000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fabc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85104800 r7:00000000 r6:83018200 r5:00001000 r4:7f1f9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb69f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85937f8c r4:85937c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85937f8c r4:859fe000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85104800 r8:859fe02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859fe000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859fe000 r8:80287e08 r7:eca71e60 r6:859fe080 r5:85104800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca39fb0 to 0xeca39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:859d4500 INFO: task kworker/1:335:6024 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:336:6106 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:336 state:D stack:0 pid:6106 tgid:6106 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbc1d84 r8:00000002 r7:60000113 r6:ecbc1d8c r5:850fbc00 r4:850fbc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850fbc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbc1e08 r4:00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:850fbc00 r8:859fe12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9f1d28 to 0xdf9f1d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:337:6109 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:337 state:D stack:0 pid:6109 tgid:6109 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb31d84 r8:00000002 r7:60000113 r6:ecb31d8c r5:850fd400 r4:850fd400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850fd400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb31e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84722b8c r4:859fe200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850fd400 r8:859fe22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859fe200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859fe200 r8:80287e08 r7:ecbc1e60 r6:859fe280 r5:850fd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb31fb0 to 0xecb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852fad40 INFO: task kworker/1:337:6109 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 1d20: 8a3eb000 eca77000 00000001 80239b98 7f1eb000 00000001 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:850fe000 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84721b8c r4:84721800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84721b8c r4:859fe300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850fe000 r8:859fe32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859fe300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859fe300 r8:80287e08 r7:ecbc1e60 r6:859fe380 r5:850fe000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbe1fb0 to 0xecbe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852fae40 INFO: task kworker/1:338:6111 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8a708000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:850fc800 r8:859fe42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xecbe5fb0 to 0xecbe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84480300 INFO: task kworker/1:339:6112 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8a7e1000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:340:6113 blocked for more than 475 seconds. r10:8291a684 r9:ecbe9d84 r8:00000002 r7:60000113 r6:ecbe9d8c r5:850fb000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85368040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f203000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbf5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84721f8c r4:84721c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84721f8c r4:859fe500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850fb000 r8:859fe52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859fe500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859fe500 r8:80287e08 r7:ecbe1e60 r6:859fe580 r5:850fb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbe9fb0 to 0xecbe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852fae00 INFO: task kworker/1:340:6113 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8afc8000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:341:6117 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:341 state:D stack:0 pid:6117 tgid:6117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbddd84 r8:00000002 r7:60000113 r6:ecbddd8c r5:850fec00 r4:850fec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850fec00 r4:8291a680 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:8472178c r4:859fe600 r10:61c88647 r9:850fec00 r8:859fe62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859fe600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859fe600 r8:80287e08 r7:ecbe1e60 r6:859fe680 r5:850fec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbddfb0 to 0xecbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85368100 INFO: task kworker/1:341:6117 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8afc8000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r5:00001000 r4:dfbf9000 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:847d0740 Workqueue: events bpf_prog_free_deferred r4:850f8c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf1e08 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85368700 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f20b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd4f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84720f8c r4:84720c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84720f8c r4:859fe700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850f8c00 r8:859fe72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859fe700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859fe700 r8:80287e08 r7:ecbdde60 r6:859fe780 r5:850f8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf1fb0 to 0xecbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85368200 INFO: task kworker/1:342:6119 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8b058000 eca77000 00000001 80239b98 7f1eb000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:343:6121 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:343 state:D stack:0 pid:6121 tgid:6121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbf5d84 r8:00000002 r7:60000113 r6:ecbf5d8c r5:850fa400 r4:850fa400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850fa400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85368540 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f209000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebca5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8472138c r4:84721000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8472138c r4:859fe800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850fa400 r8:859fe82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859fe800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859fe800 r8:80287e08 r7:ecbf1e60 r6:859fe880 r5:850fa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf5fb0 to 0xecbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f20d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd7d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84720b8c r4:84720800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84720b8c r4:859fe900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850f9800 r8:859fe92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859fe900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859fe900 r8:80287e08 r7:ecbf1e60 r6:859fe980 r5:850f9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf9fb0 to 0xecbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85368580 INFO: task kworker/1:344:6123 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:345 state:D stack:0 pid:6125 tgid:6125 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8599c78c r4:8599c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8599c78c r4:859fea00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850f8000 r8:859fea2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859fea00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859fea00 r8:80287e08 r7:ecbf9e60 r6:859fea80 r5:850f8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbfdfb0 to 0xecbfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85368680 INFO: task kworker/1:345:6125 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8baf0000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85368a00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:859feb00 Exception stack(0xecc01fb0 to 0xecc01ff8) r4:85368800 Call trace: Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8be52000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:347:6131 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:347 state:D stack:0 pid:6131 tgid:6131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecbedd84 r8:00000002 r7:60000013 r6:ecbedd8c r5:85970c00 r4:85970c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85970c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbede08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:ec779000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:859fec00 r8:80287e08 r7:ecbfde60 r6:859fec80 r5:85970c00 r4:85368c00 Call trace: 1d20: 8c1a7000 eca77000 00000001 80239b98 7f1eb000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:348:6132 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:348 state:D stack:0 pid:6132 tgid:6132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc09d84 r8:00000002 r7:60000013 r6:ecc09d8c r5:85971800 r4:85971800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85971800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc09e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85368d00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85971800 r7:00000000 r6:83018200 r5:00001000 r4:7f215000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec751000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8599cb8c r4:8599c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8599cb8c r4:859fed00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85971800 r8:859fed2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:859fed00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859fed00 r8:80287e08 r7:ecbede60 r6:859fed80 r5:85971800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc09fb0 to 0xecc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: Exception stack(0xdf9f1d28 to 0xdf9f1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:349:6134 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:349 state:D stack:0 pid:6134 tgid:6134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc0dd84 r8:00000002 r7:60000113 r6:ecc0dd8c r5:85970000 r4:85970000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85970000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc0de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85312fc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85970000 r7:00000000 r6:83018200 r5:00001000 r4:7f219000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7a1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8599d38c r4:8599d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8599d38c r4:859fee00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85368a40 Call trace: 1d20: 8c6b3000 eca77000 00000001 80239b98 7f1eb000 00000001 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc11fb0 to 0xecc11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85368c40 INFO: task kworker/1:350:6136 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8c9c2000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8599d78c r4:8599d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8599d78c r4:85365000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85973c00 r8:8536502c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85365000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85365000 r8:80287e08 r7:ecc11e60 r6:85365080 r5:85973c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc15fb0 to 0xecc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853a1140 INFO: task kworker/1:351:6137 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8cb8f000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:df9f1dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:8599e38c r4:85365100 r10:00000000 r9:85365100 r8:80287e08 r7:ecc11e60 r6:85365180 r5:85974800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc05fb0 to 0xecc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853a12c0 INFO: task kworker/1:352:6140 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8cf0d000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 INFO: task kworker/1:353:6143 blocked for more than 476 seconds. r4:85975400 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc1de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a1580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85975400 r7:00000000 r6:83018200 r5:00001000 r4:7f21f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec81b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8599df8c r4:8599dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8599df8c r4:85365200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85975400 r8:8536522c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85365200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xdf9f1d28 to 0xdf9f1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r5:84fdef8c r4:84fdec00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:847d0740 Workqueue: events bpf_prog_free_deferred [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8599e78c r4:8599e400 r4:00000001 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8d467000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:8599eb8c r4:85365400 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853a1700 INFO: task kworker/1:355:6147 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8d715000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:356:6149 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:356 state:D stack:0 pid:6149 tgid:6149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc29d84 r8:00000002 r7:60000113 r6:ecc29d8c r5:85978c00 r4:85978c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85978c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc29e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a1f80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85978c00 r7:00000000 r6:83018200 r5:00001000 r4:7f22d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec91d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8599f38c r4:8599f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8599f38c r4:85365500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85978c00 r8:8536552c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85365500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:8597a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc31e08 r5:00001000 r4:ec8d1000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r5:84fdef8c r4:84fdec00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:358:6155 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:358 state:D stack:0 pid:6155 tgid:6155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc35d84 r8:00000002 r7:60000113 r6:ecc35d8c r5:85979800 r4:85979800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85979800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc35e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e7040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85979800 r7:00000000 r6:83018200 r5:00001000 r4:7f231000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec93f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8599fb8c r4:8599f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8599fb8c r4:85365700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85979800 r8:8536572c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85365700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85365700 r8:80287e08 r7:ecc29e60 r6:85365780 r5:85979800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc35fb0 to 0xecc35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853a1e00 INFO: task kworker/1:358:6155 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8dba4000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:359 state:D stack:0 pid:6156 tgid:6156 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ec929000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8599f78c r4:8599f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8599f78c r4:85365800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8597b000 r8:8536582c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85365800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85365800 r8:80287e08 r7:ecc35e60 r6:85365880 r5:8597b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc25fb0 to 0xecc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853a1e80 INFO: task kworker/1:359:6156 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: Exception stack(0xdf9f1d28 to 0xdf9f1d70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r5:84fdef8c r4:84fdec00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:847d0740 r10:8291a684 r9:ecc2dd84 r8:00000002 r7:60000113 r6:ecc2dd8c r5:8597bc00 r5:00001000 r4:ec94d000 r4:85365900 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d20: 8df5b000 eca77000 00000001 80239b98 7f1eb000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:361:6160 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:361 state:D stack:0 pid:6160 tgid:6160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc3dd84 r8:00000002 r7:60000013 r6:ecc3dd8c r5:8597c800 r4:8597c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:859a838c r4:859a8000 Exception stack(0xecc3dfb0 to 0xecc3dff8) Call trace: 1d60: 80230ad0 80239bb0 800f0113 ffffffff [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fa0: 00000000 00000000 00000000 00000000 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:859a878c r4:859a8400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8eadf000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:363:6164 blocked for more than 476 seconds. r4:8597e000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e77c0 r10:61c88647 r9:8597e000 r8:85365c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc39fb0 to 0xecc39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e73c0 INFO: task kworker/1:363:6164 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 1d60: 80230ad0 80239bb0 800f0113 ffffffff r4:df9f1dc0 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:364 state:D stack:0 pid:6166 tgid:6166 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e7c80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8597ec00 r8:85365d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc45fb0 to 0xecc45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e7640 INFO: task kworker/1:364:6166 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8eef5000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:859a8f8c r4:85365e00 r10:00000000 r9:85365e00 r8:80287e08 r7:ecc45e60 r6:85900e00 r5:84d10000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9f1d28 to 0xdf9f1d70) r5:800f0113 r4:80239bb0 r4:df9f1dc0 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:366:6174 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:366 state:D stack:0 pid:6174 tgid:6174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc5dd84 r8:00000002 r7:60000013 r6:ecc5dd8c r5:84d15400 r4:84d15400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84d15400 r8:85365eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:85365e80 r8:80287e08 r7:ecc45e60 r6:85900e80 r5:84d15400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:847d0740 r10:8291a684 r9:ecc61d84 r8:00000002 r7:60000113 r6:ecc61d8c r5:84d14800 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8f468000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:368:6176 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:368 state:D stack:0 pid:6176 tgid:6176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecc65d84 r8:00000002 r7:60000113 r6:ecc65d8c r5:857f3c00 r4:857f3c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857f3c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc65e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f200 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df885000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859a9b8c r4:859a9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859a9b8c r4:85365f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857f3c00 r8:85365fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85365f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85365f80 r8:80287e08 r7:ecc61e60 r6:85900f80 r5:857f3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc65fb0 to 0xecc65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e7c40 INFO: task kworker/1:368:6176 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8f870000 eca77000 00000001 80239b98 7f1eb000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r5:84fdef8c r4:84fdec00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecad1d84 r8:00000002 r7:60000013 r6:ecad1d8c r5:84d16c00 r4:84d16c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84d16c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecad1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a580c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84d16c00 r7:00000000 r6:83018200 r5:00001000 r4:7f2b9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd6b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859abb8c r4:859ab800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859abb8c r4:851fd000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84d16c00 r8:851fd02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fd000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd000 r8:80287e08 r7:ecc61e60 r6:85370000 r5:84d16c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecad1fb0 to 0xecad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e7f80 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) r4:847d0740 Workqueue: events bpf_prog_free_deferred r5:857f5400 r4:8291a680 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:859aa38c r4:851fd080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857f5400 r8:851fd0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fd080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd080 r8:80287e08 r7:ecad1e60 r6:85370080 r5:857f5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc55fb0 to 0xecc55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e7f80 INFO: task kworker/1:370:6184 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8fe94000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e1540 r5:00001000 r4:ebc45000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859ab38c r4:859ab000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85981800 r8:851fd12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fd100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd100 r8:80287e08 r7:ecad1e60 r6:851fd180 r5:85981800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd6dfb0 to 0xecd6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538fe40 INFO: task kworker/1:371:6220 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 8fe94000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eccb9d84 r8:00000002 r7:60000113 r6:eccb9d8c r5:85984800 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84480e00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 901c5000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:373 state:D stack:0 pid:6286 tgid:6286 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a58480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84314800 r7:00000000 r6:83018200 r5:00001000 r4:7f2bd000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec73b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84723b8c r4:84723800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84723b8c r4:851fd300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84314800 r8:851fd32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fd300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd300 r8:80287e08 r7:ecad1e60 r6:85370100 r5:84314800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd7dfb0 to 0xecd7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a58100 INFO: task kworker/1:373:6286 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 901c5000 eca77000 00000001 80239b98 7f1eb000 00000001 1d60: 80230ad0 80239bb0 800f0113 ffffffff r4:df9f1dc0 r5:00001000 r4:dfbf9000 r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:847d0740 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84315400 r8:851fd3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fd380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd380 r8:80287e08 r7:ecd7de60 r6:85370180 r5:84315400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecda5fb0 to 0xecda5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a58100 INFO: task kworker/1:374:6287 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 905da000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 r5:00001000 r4:dfbf9000 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:847d0740 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a58740 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:851fd400 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a58280 INFO: task kworker/1:375:6290 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 905da000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:376:6292 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:376 state:D stack:0 pid:6292 tgid:6292 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecde9d84 r8:00000002 r7:60000013 r6:ecde9d8c r5:84313c00 r4:84313c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84313c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84313c00 r8:851fd4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:82ac21e4 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:377:6294 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:377 state:D stack:0 pid:6294 tgid:6294 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecdedd84 r8:00000002 r7:60000113 r6:ecdedd8c r5:84313000 r4:84313000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84313000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdede08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a58880 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84313000 r7:00000000 r6:83018200 r5:00001000 r4:7f2c3000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec813000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b038c r4:859b0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859b038c r4:851fd500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84313000 r8:851fd52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fd500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd500 r8:80287e08 r7:ecde5e60 r6:85370300 r5:84313000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdedfb0 to 0xecdedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a585c0 INFO: task kworker/1:377:6294 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 91238000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:378:6296 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:378 state:D stack:0 pid:6296 tgid:6296 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ecdf1d84 r8:00000002 r7:60000113 r6:ecdf1d8c r5:84310000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84310000 r8:851fd5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xecdf1fb0 to 0xecdf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a58780 INFO: task kworker/1:378:6296 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 9151a000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:379:6297 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:379 state:D stack:0 pid:6297 tgid:6297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecdf5d84 r8:00000002 r7:60000013 r6:ecdf5d8c r5:84310c00 r4:84310c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84310c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdf5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a58a00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84310c00 r7:00000000 r6:83018200 r5:00001000 r4:7f2c5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec843000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b078c r4:859b0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859b078c r4:851fd600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84310c00 r8:851fd62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fd600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd600 r8:80287e08 r7:ecdf1e60 r6:85370400 r5:84310c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdf5fb0 to 0xecdf5ff8) 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:379:6297 is blocked on a mutex likely owned by task kworker/1:6:3130. Exception stack(0xdf9f1d28 to 0xdf9f1d70) r4:82ac21e4 r4:df9f1dc0 r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:380 state:D stack:0 pid:6300 tgid:6300 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece01d84 r8:00000002 r7:60000113 r6:ece01d8c r5:84312400 r4:84312400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84312400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece01e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a58c00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84312400 r7:00000000 r6:83018200 r5:00001000 r4:7f2c9000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b0f8c r4:859b0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859b0f8c r4:851fd680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84312400 r8:851fd6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fd680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd680 r8:80287e08 r7:ecdf1e60 r6:85370480 r5:84312400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece01fb0 to 0xece01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a58900 INFO: task kworker/1:380:6300 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 918cf000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:381:6302 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:381 state:D stack:0 pid:6302 tgid:6302 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece09d84 r8:00000002 r7:60000113 r6:ece09d8c r5:85978000 r4:85978000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85978000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece09e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a58980 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85978000 r7:00000000 r6:83018200 r5:00001000 r4:7f2cb000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec915000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b138c r4:859b1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859b138c r4:851fd700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85978000 r8:851fd72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fd700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd700 r8:80287e08 r7:ece01e60 r6:85370500 r5:85978000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece09fb0 to 0xece09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a58980 INFO: task kworker/1:381:6302 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 91b7a000 eca77000 00000001 80239b98 7f1eb000 00000001 r5:800f0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:382:6304 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:382 state:D stack:0 pid:6304 tgid:6304 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece0dd84 r8:00000002 r7:60000113 r6:ece0dd8c r5:84311800 r4:84311800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84311800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece0de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a58f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84311800 r7:00000000 r6:83018200 r5:00001000 r4:7f2cd000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec937000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b178c r4:859b1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859b178c r4:851fd780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84311800 r8:851fd7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fd780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd780 r8:80287e08 r7:ece09e60 r6:85370580 r5:84311800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece0dfb0 to 0xece0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: r4:00000000 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:383:6306 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:383 state:D stack:0 pid:6306 tgid:6306 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece11d84 r8:00000002 r7:60000013 r6:ece11d8c r5:84316000 r4:84316000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84316000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece11e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a58040 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84316000 r7:00000000 r6:83018200 r5:00001000 r4:7f2cf000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:859b1b8c r4:851fd800 r4:00000001 r4:85a58d00 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r9:83018205 r8:85948000 r7:00000000 r6:83018200 r5:00001000 r4:7f2d1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca4f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b1f8c r4:859b1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859b1f8c r4:851fd880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85948000 r8:851fd8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fd880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd880 r8:80287e08 r7:ece11e60 r6:85370680 r5:85948000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece15fb0 to 0xece15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a58c80 INFO: task kworker/1:384:6308 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 92151000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 INFO: task kworker/1:385:6310 blocked for more than 477 seconds. r4:85986000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece05e08 r4:00000000 r5:859b278c r4:859b2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859b278c r4:851fd900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85986000 r8:851fd92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fd900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fd900 r8:80287e08 r7:ece15e60 r6:851fd980 r5:85986000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece05fb0 to 0xece05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a54a00 INFO: task kworker/1:385:6310 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 9278b000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ecda1d84 r8:00000002 r7:60000113 r6:ecda1d8c r5:85982400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecda1e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:859b238c r4:851fda00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 92b09000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/1:387:6314 blocked for more than 477 seconds. r5:85980c00 r4:8291a680 r4:00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:859b2b8c r4:859b2800 r10:61c88647 r9:85980c00 r8:851fdb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9f1d28 to 0xdf9f1d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:388:6316 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:388 state:D stack:0 pid:6316 tgid:6316 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece1dd84 r8:00000002 r7:60000013 r6:ece1dd8c r5:85983000 r4:85983000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ecabd000 r5:859b2f8c r4:859b2c00 r10:61c88647 r9:85983000 r8:851fdc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fdc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fdc00 r8:80287e08 r7:ece19e60 r6:851fdc80 r5:85983000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece1dfb0 to 0xece1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a530c0 INFO: task kworker/1:388:6316 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 92ff9000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:847d0740 Not tainted 6.15.0-rc7-syzkaller #0 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:85985400 r7:00000000 r6:83018200 r5:00001000 r4:7f2e3000 r5:859b3b8c r4:859b3800 r10:61c88647 r9:85985400 r8:851fdd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 93466000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:390:6321 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:390 state:D stack:0 pid:6321 tgid:6321 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece2dd84 r8:00000002 r7:60000113 r6:ece2dd8c r5:85983c00 r4:85983c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85983c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece2de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a53b80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85983c00 r7:00000000 r6:83018200 r5:00001000 r4:7f2df000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb35000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece31e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a53c80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85976c00 r7:00000000 r6:83018200 r5:00001000 r4:7f2e1000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb49000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b378c r4:859b3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859b378c r4:851fdf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85976c00 r8:851fdf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851fdf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fdf00 r8:80287e08 r7:ece25e60 r6:851fdf80 r5:85976c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece31fb0 to 0xece31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a53a80 INFO: task kworker/1:391:6324 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 93903000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84fdef8c r4:84fdec00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85948c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccade08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85948c00 r8:85a5a02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5a000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5a000 r8:80287e08 r7:ece25e60 r6:85370700 r5:85948c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccadfb0 to 0xeccadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a53d80 INFO: task kworker/1:392:6325 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 93ba6000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:393 state:D stack:0 pid:6328 tgid:6328 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:394:6330 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:394 state:D stack:0 pid:6330 tgid:6330 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece21d84 r8:00000002 r7:60000013 r6:ece21d8c r5:8594a400 r4:8594a400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8594a400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece21e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4b400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:859b8b8c r4:859b8800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4b1c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8594b000 r7:00000000 r6:83018200 r5:00001000 r4:7f2ef000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd19000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b8f8c r4:859b8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859b8f8c r4:85a5a180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8594b000 r8:85a5a1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5a180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5a180 r8:80287e08 r7:ece21e60 r6:85370880 r5:8594b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece35fb0 to 0xece35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a4b1c0 INFO: task kworker/1:395:6334 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 94847000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:859b938c r4:859b9000 r10:61c88647 r9:8594bc00 r8:85a5a22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:397:6339 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:397 state:D stack:0 pid:6339 tgid:6339 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece41d84 r8:00000002 r7:60000113 r6:ece41d8c r5:8594c800 r4:8594c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8594c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece41e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4b800 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8594c800 r7:00000000 r6:83018200 r5:00001000 r4:7f1f5000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfba3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859b978c r4:859b9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859b978c r4:85a5a280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8594c800 r8:85a5a2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5a280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5a280 r8:80287e08 r7:ece3de60 r6:85370980 r5:8594c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece41fb0 to 0xece41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:398:6340 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:398 state:D stack:0 pid:6340 tgid:6340 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece45d84 r8:00000002 r7:60000113 r6:ece45d8c r5:8594d400 r4:8594d400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:859ba38c r4:859ba000 r7:ddde2d80 r6:83018200 r5:859ba38c r4:85a5a300 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9f1d28 to 0xdf9f1d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece49e08 r9:83018205 r8:8594e000 r7:00000000 r6:83018200 r5:00001000 r4:7f2f3000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85a5a380 r8:80287e08 r7:ece45e60 r6:85370a80 r5:8594e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece49fb0 to 0xece49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a4b8c0 INFO: task kworker/1:399:6341 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 951d2000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:400:6344 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:8594ec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece4de08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:400:6344 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 95631000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:401:6345 blocked for more than 477 seconds. [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ece5b000 r5:859bab8c r4:859ba800 r10:61c88647 r9:85438000 r8:85a5a4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece39d84 r8:00000002 r7:60000113 r6:ece39d8c r5:85438c00 r4:85438c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85438c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece39e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a4bdc0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85438c00 r7:00000000 r6:83018200 r5:00001000 r4:7f2fb000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd85000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859ba78c r4:859ba400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859ba78c r4:85a5a500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85438c00 r8:85a5a52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5a500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5a500 r8:80287e08 r7:ece51e60 r6:85370c00 r5:85438c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece39fb0 to 0xece39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a4ba00 INFO: task kworker/1:402:6347 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xdf9f1d28 to 0xdf9f1d70) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a53f40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85439800 r7:00000000 r6:83018200 r5:00001000 r4:7f301000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece63000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859baf8c r4:859bac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859baf8c r4:85a5a580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85439800 r8:85a5a5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5a580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5a580 r8:80287e08 r7:ece51e60 r6:85370c80 r5:85439800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece59fb0 to 0xece59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85a4be00 INFO: task kworker/1:403:6352 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:847e6b00 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r4:8543b000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece79e08 r9:83018205 r8:8543b000 r7:00000000 r6:83018200 r5:00001000 r4:7f303000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:405:6356 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:405 state:D stack:0 pid:6356 tgid:6356 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ece81d84 r8:00000002 r7:60000113 r6:ece81d8c r5:8543c800 r4:8543c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece81e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f400 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8543c800 r7:00000000 r6:83018200 r5:00001000 r4:7f309000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecea3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bbf8c r4:859bbc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859bbf8c r4:85a5a680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543c800 r8:85a5a6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5a680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5a680 r8:80287e08 r7:ece79e60 r6:85370d80 r5:8543c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece81fb0 to 0xece81ff8) 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:405:6356 is blocked on a mutex likely owned by task kworker/1:6:3130. 1d60: 80230ad0 80239bb0 800f0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece91e08 r5:00001000 r4:ece83000 r7:ddde2d80 r6:83018200 r5:859bb78c r4:85a5a700 r4:85a5a700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5a700 r8:80287e08 r7:ece81e60 r6:85370e00 r5:8543d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece91fb0 to 0xece91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84cce600 INFO: task kworker/1:406:6358 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 96f9c000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) task:kworker/1:407 state:D stack:0 pid:6359 tgid:6359 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece9de08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538f080 INFO: task kworker/1:407:6359 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 96f9c000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) Workqueue: events bpf_prog_free_deferred [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/1:408:6361 is blocked on a mutex likely owned by task kworker/1:6:3130. Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 978c0000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:409 state:D stack:0 pid:6363 tgid:6363 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eceb5d84 r8:00000002 r7:60000113 r6:eceb5d8c r5:8543e000 r4:8543e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543e000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eceb5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538f6c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8543e000 r7:00000000 r6:83018200 r5:00001000 r4:7f30b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceb7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bc38c r4:859bc000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859bc38c r4:85a5a880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543e000 r8:85a5a8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:85a5a880 r8:80287e08 r7:ecea9e60 r6:85370f80 r5:8543e000 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff r4:df9f1dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538fa40 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bcb8c r4:859bc800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859bcb8c r4:85a5a900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e08000 r8:85a5a92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5a900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5a900 r8:80287e08 r7:ecea9e60 r6:85a4a000 r5:84e08000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeced9fb0 to 0xeced9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538f480 INFO: task kworker/1:410:6367 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 97ecb000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:411:6369 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:411 state:D stack:0 pid:6369 tgid:6369 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecee9d84 r8:00000002 r7:60000113 r6:ecee9d8c r5:84e09800 r4:84e09800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e09800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84e09800 r7:00000000 r6:83018200 r5:00001000 r4:7f31d000 r10:61c88647 r9:84e09800 r8:85a5a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 981c6000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538fb80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e0a400 r7:00000000 r6:83018200 r5:00001000 r4:7f313000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecedf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bcf8c r4:859bcc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859bcf8c r4:85a5aa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e0a400 r8:85a5aa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 r4:847d0740 r4:84e08c00 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:61c88647 r9:84e08c00 r8:85a5aaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:414:6374 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:414 state:D stack:0 pid:6374 tgid:6374 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eceb1d84 r8:00000002 r7:60000113 r6:eceb1d8c r5:84e0bc00 r4:84e0bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84e0bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eceb1e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:00001000 r4:ecf07000 r10:61c88647 r9:84e0bc00 r8:85a5ab2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Call trace: [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-rc7-syzkaller #0 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf19e08 r10:61c88647 r9:84e0c800 r8:85a5abac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538ff00 INFO: task kworker/1:415:6378 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 98c71000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf25e08 r5:859be78c r4:859be400 r10:61c88647 r9:84e0d400 r8:85a5ac2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf25fb0 to 0xecf25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538f680 INFO: task kworker/1:416:6380 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 98f5d000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:417:6381 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:417 state:D stack:0 pid:6381 tgid:6381 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecf31d84 r8:00000002 r7:60000013 r6:ecf31d8c r5:84e0e000 r4:84e0e000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf31e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fa0c0 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:859bdf8c r4:859bdc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r5:84fdef8c r4:84fdec00 r4:847e6b00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e1380 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84e0b000 r7:00000000 r6:83018200 r5:00001000 r4:7f325000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf47000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859beb8c r4:859be800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859beb8c r4:85a5ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e0b000 r8:85a5acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5ac80 r8:80287e08 r7:ecf25e60 r6:85a4a400 r5:84e0b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf45fb0 to 0xecf45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853e1100 INFO: task kworker/1:418:6385 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 99306000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847e6b00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e15c0 r9:83018205 r8:85958000 r7:00000000 r6:83018200 r5:00001000 r4:7f327000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bef8c r4:859bec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859bef8c r4:85a5ad80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85958000 r8:85a5adac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5ad80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847d0740 r4:85959800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa5300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:853e1240 Exception stack(0xdf9f1d28 to 0xdf9f1d70) [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:8595a400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e1a00 r10:61c88647 r9:8595a400 r8:85a5aeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r4:df9f1dc0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:422 state:D stack:0 pid:6403 tgid:6403 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:ec8a7000 r4:85a5af00 INFO: task kworker/1:422:6403 is blocked on a mutex likely owned by task kworker/1:6:3130. r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) r4:847d0740 Not tainted 6.15.0-rc7-syzkaller #0 r4:8595d400 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed009e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa5440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8595d400 r7:00000000 r6:83018200 r5:00001000 r4:7f2ff000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8b7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859bff8c r4:859bfc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859bff8c r4:85a5af80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8595d400 r8:85a5afac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85a5af80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a5af80 r8:80287e08 r7:ecf65e60 r6:85a4a680 r5:8595d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xed009fb0 to 0xed009ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85aa5180 INFO: task kworker/1:423:6445 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r5:800f0113 r4:80239bb0 r4:df9f1dc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf61e08 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa5a80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8595e000 r7:00000000 r6:83018200 r5:00001000 r4:7f30b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec983000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c078c r4:859c0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c078c r4:85aa6000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8595e000 r8:85aa602c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6000 r8:80287e08 r7:ed009e60 r6:85a4a700 r5:8595e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf61fb0 to 0xecf61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85aa52c0 INFO: task kworker/1:424:6446 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:425:6448 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:425 state:D stack:0 pid:6448 tgid:6448 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec905d84 r8:00000002 r7:60000113 r6:ec905d8c r5:8595ec00 r4:8595ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8595ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec905e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa5740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8595ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f305000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec967000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8472838c r4:84728000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8472838c r4:85aa6080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xdf9f1d28 to 0xdf9f1d70) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:426:6453 blocked for more than 478 seconds. r5:8595c800 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85aa6100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6100 r8:80287e08 r7:ecf61e60 r6:85a4a800 r5:8595c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8a5fb0 to 0xec8a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85aa5640 INFO: task kworker/1:426:6453 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 9a527000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec965e08 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa5b80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8595b000 r7:00000000 r6:83018200 r5:00001000 r4:7f30f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec98b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c0b8c r4:859c0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c0b8c r4:85aa6180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8595b000 r8:85aa61ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6180 r8:80287e08 r7:ecf61e60 r6:85a4a880 r5:8595b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec965fb0 to 0xec965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85aa5800 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:428:6458 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:428 state:D stack:0 pid:6458 tgid:6458 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec909d84 r8:00000002 r7:60000013 r6:ec909d8c r5:85958c00 r4:85958c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85958c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec909e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa5d40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85958c00 r7:00000000 r6:83018200 r5:00001000 r4:7f311000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec993000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ec99dd84 r8:00000002 r7:60000013 r6:ec99dd8c r5:8543ec00 r4:8543ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8543ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec99de08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa5e80 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8543ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f313000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9a3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c138c r4:859c1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c138c r4:85aa6280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8543ec00 r8:85aa62ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6280 r8:80287e08 r7:ec909e60 r6:85a4a980 r5:8543ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec99dfb0 to 0xec99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85aa5bc0 INFO: task kworker/1:429:6460 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) r5:800f0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:430:6462 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c178c r4:859c1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c178c r4:85aa6300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84e0ec00 r8:85aa632c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6300 r8:80287e08 r7:ec99de60 r6:85a4aa00 r5:84e0ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9adfb0 to 0xec9adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85aa5d00 INFO: task kworker/1:430:6462 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 9aeb0000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:431 state:D stack:0 pid:6465 tgid:6465 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab1040 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c1b8c r4:859c1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c1b8c r4:85aa6380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84440000 r8:85aa63ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6380 r8:80287e08 r7:ec9ade60 r6:85a4aa80 r5:84440000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec981fb0 to 0xec981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85aa5ec0 INFO: task kworker/1:431:6465 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 9aeb0000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) r4:847d0740 Workqueue: events bpf_prog_free_deferred r5:84440c00 r4:8291a680 r4:00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84440c00 r8:85aa642c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: Exception stack(0xdf9f1d28 to 0xdf9f1d70) r5:800f0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:433:6469 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:433 state:D stack:0 pid:6469 tgid:6469 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9ddd84 r8:00000002 r7:60000113 r6:ec9ddd8c r5:84442400 r4:84442400 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84442400 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9dde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab1480 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84442400 r7:00000000 r6:83018200 r5:00001000 r4:7f31f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9df000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c238c r4:859c2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c238c r4:85aa6480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84442400 r8:85aa64ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6480 r8:80287e08 r7:ec9cde60 r6:85a4ab80 r5:84442400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9ddfb0 to 0xec9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85ab11c0 INFO: task kworker/1:433:6469 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 9b734000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:847d0740 Workqueue: events bpf_prog_free_deferred r5:84443c00 r4:8291a680 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84443c00 r8:85aa652c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 1d20: 9b734000 eca77000 00000001 80239b98 7f1eb000 00000001 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:847d0740 task:kworker/1:435 state:D stack:0 pid:6473 tgid:6473 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec9fdd84 r8:00000002 r7:60000113 r6:ec9fdd8c r5:84444800 r4:84444800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84444800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9fde08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab1b40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84444800 r7:00000000 r6:83018200 r5:00001000 r4:7f34d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca27000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c378c r4:859c3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c378c r4:85aa6580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84444800 r8:85aa65ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6580 r8:80287e08 r7:ec9ede60 r6:85a4ac80 r5:84444800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9fdfb0 to 0xec9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85ab1380 INFO: task kworker/1:435:6473 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 1fa0: 00000000 00000000 00000000 00000000 r10:8291a684 r9:eca09d84 r8:00000002 r7:60000013 r6:eca09d8c r5:84445400 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:85ab1380 INFO: task kworker/1:436:6474 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 9bdf0000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eca0f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85ab1500 INFO: task kworker/1:437:6476 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 9bf03000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:847d0740 Workqueue: events bpf_prog_free_deferred [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8598b000 r8:85aa67ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xdf9f1d28 to 0xdf9f1d70) r5:800f0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:439:6481 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:439 state:D stack:0 pid:6481 tgid:6481 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca25d84 r8:00000002 r7:60000113 r6:eca25d8c r5:8598bc00 r4:8598bc00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8598bc00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca25e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab1c40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8598bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f34f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca33000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c3b8c r4:859c3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c3b8c r4:85aa6880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8598bc00 r8:85aa68ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6880 r8:80287e08 r7:ec9fde60 r6:85aa6900 r5:8598bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca25fb0 to 0xeca25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85ab1b80 INFO: task kworker/1:439:6481 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 9c4b3000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:440:6483 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:440 state:D stack:0 pid:6483 tgid:6483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eca31d84 r8:00000002 r7:60000113 r6:eca31d8c r5:8598c800 r4:8598c800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8598c800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca31e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85ab1d80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8598c800 r8:85aa69ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85ab1cc0 INFO: task kworker/1:440:6483 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 9c870000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:441:6485 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:441 state:D stack:0 pid:6485 tgid:6485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecab5d84 r8:00000002 r7:60000013 r6:ecab5d8c r5:8598d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecab5e08 r5:00001000 r4:eca87000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8598d400 r8:85aa6aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6a80 r8:80287e08 r7:eca31e60 r6:85aa6b00 r5:8598d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecab5fb0 to 0xecab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85ab1b80 INFO: task kworker/1:441:6485 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 9c870000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 r4:847d0740 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:84441800 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d3040 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84441800 r8:85aa6bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:85aa6b80 r8:80287e08 r7:ecab5e60 r6:85a4ad80 r5:84441800 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85ab1b80 Workqueue: events bpf_prog_free_deferred Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:443:6489 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:443 state:D stack:0 pid:6489 tgid:6489 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecae9d84 r8:00000002 r7:60000113 r6:ecae9d8c r5:84446c00 r4:84446c00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84446c00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecae9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85aa5780 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84446c00 r7:00000000 r6:83018200 r5:00001000 r4:7f355000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecadb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c478c r4:859c4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c478c r4:85aa6c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84446c00 r8:85aa6c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6c00 r8:80287e08 r7:ecad9e60 r6:85a4ae00 r5:84446c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecae9fb0 to 0xecae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85aa5d80 INFO: task kworker/1:443:6489 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 9cb82000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:444:6491 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:444 state:D stack:0 pid:6491 tgid:6491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecaf9d84 r8:00000002 r7:60000113 r6:ecaf9d8c r5:84443000 r4:84443000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84443000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaf9e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d3300 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84443000 r7:00000000 r6:83018200 r5:00001000 r4:7f359000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecafb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c4f8c r4:859c4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c4f8c r4:85aa6c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84443000 r8:85aa6cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6c80 r8:80287e08 r7:ecad9e60 r6:85a4ae80 r5:84443000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaf9fb0 to 0xecaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854d30c0 INFO: task kworker/1:444:6491 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 9d09a000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:dfbf9000 r10:61c88647 r9:8430b000 r8:847e6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 r4:847d0740 task:kworker/1:445 state:D stack:0 pid:6493 tgid:6493 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecacde08 r4:00000000 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d3440 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8598e000 r7:00000000 r6:83018200 r5:00001000 r4:7f35b000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c538c r4:859c5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c538c r4:85aa6d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8598e000 r8:85aa6d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6d00 r8:80287e08 r7:ecaf9e60 r6:85aa6d80 r5:8598e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecacdfb0 to 0xecacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854d30c0 INFO: task kworker/1:445:6493 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 9d09a000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f1fb0 to 0xdf9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:446:6496 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:446 state:D stack:0 pid:6496 tgid:6496 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecaf5d84 r8:00000002 r7:60000013 r6:ecaf5d8c r5:8598ec00 r4:8598ec00 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8598ec00 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaf5e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d3a40 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8598ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f363000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb87000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c638c r4:859c6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8598ec00 r8:85aa6e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d32c0 r4:00000000 r5:800f0113 r4:80239bb0 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 task:kworker/1:447 state:D stack:0 pid:6497 tgid:6497 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291a684 r9:ecb25d84 r8:00000002 r7:60000113 r6:ecb25d8c r5:85988000 r4:85988000 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85988000 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb25e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d3580 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85988000 r7:00000000 r6:83018200 r5:00001000 r4:7f35d000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c578c r4:859c5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c578c r4:85aa6f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85988000 r8:85aa6f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85aa6f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85aa6f00 r8:80287e08 r7:ecaf5e60 r6:85aa6f80 r5:85988000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb25fb0 to 0xecb25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854d3400 INFO: task kworker/1:447:6497 is blocked on a mutex likely owned by task kworker/1:6:3130. task:kworker/1:6 state:R running task stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a5465c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:8430b000 r8:80200be4 r7:df9f1d5c r6:ffffffff r5:8430b000 r4:00000000 [<81a5461c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xdf9f1d28 to 0xdf9f1d70) 1d20: 9d561000 eca77000 00000001 80239b98 7f1eb000 00000001 1d40: 82ac15a0 7f1eb000 eca77000 8280c928 82ac21c4 df9f1da4 df9f1da8 df9f1d78 1d60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e762c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e741c>] (__purge_vmap_area_lazy) from [<804e79d4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:df9f1dc0 r5:df9f1e08 r4:df9f1dc0 [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d97f00 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8430b000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84fdef8c r4:84fdec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84fdef8c r4:847e6b00 r4:847e6b00 r10:00000000 r9:847e6b00 r8:80287e08 r7:df9e5e60 r6:840b4880 r5:8430b000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847d0740 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:448:6499 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:448 state:D stack:0 pid:6499 tgid:6499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a532a4>] (__schedule) from [<81a54228>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a532a4>] (__schedule) from [<81a54228>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ecb65d84 r8:00000002 r7:60000113 r6:ecb65d8c r5:85989800 r4:85989800 [<81a541fc>] (schedule) from [<81a54610>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85989800 r4:8291a680 [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545f8>] (schedule_preempt_disabled) from [<81a56cf4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569f4>] (__mutex_lock.constprop.0) from [<81a571c0>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb65e08 r4:00000000 [<81a571ac>] (__mutex_lock_slowpath) from [<81a57200>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a571c4>] (mutex_lock) from [<804e7858>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77f0>] (_vm_unmap_aliases) from [<804eb738>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d3740 r4:00000000 [<804eb5d0>] (vfree) from [<8054b184>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85989800 r7:00000000 r6:83018200 r5:00001000 r4:7f35f000 [<8054b154>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb6b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:859c5b8c r4:859c5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:859c5b8c r4:854fa000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)